May 2011
The recent social engineering attack on RSA has dominated industry talk, with some dubbing coverage of the incident a media circus.
News briefs: Expect a rise in spear phishing attacks after Epsilon, Federal Trade Commission orders Google to fix its privacy practices, and more
MANDIANT appointed Richard Bejtlich CSO and security services architect, Clearwire restructured its executive leadership team, and more personnel announcements and other news
Multiple state agencies in New Jersey left confidential information on computers set to be sold at auction, and other security-related news and cybercriminal activity from ...
Threat of the month: Flash zero-day
A pair of massive data breaches have illustrated that marketing services firms have become a high-value target of cybercriminals aiming to steal valuable information that ...
Skills in demand: A growing need for advanced threat analysts
Larry Clinton, CEO of the Internet Security Alliance, says he tries to bring industry and government together to figure out how to secure all the ...
Debate: Mobile app stores should test and certify before making apps available to customers.
If you aren't already trying to figure out your mobile device security strategy, you soon will be, says Vicky Ames, former information system security officer ...
Some 73,000 people hold the CISSP certification. But in today's competitive job marketplace, are they enough to separate oneself form the pack?
Security professionals are recognizing the need to possess operations knowledge that will help them translate security objectives into business enablement.
Three top executive security recruiters weigh in on what today's information professional needs to do to shine in a volatile marketplace.
In today's sophisticated malware and intrusion tactics, organizations should already assume they have been compromised. The key is readiness, says Larry Whiteside, CISO, Visiting Nurse ...
IT managers should consider the benefits of non-interoperable platforms, says AT&T's Ed Amoroso.
This month, the focus is on analysis. We look at the network through the lens of the SIEM, and we look at digital incidents and ...
Different fields of digital forensics place a range of requirements on the tools being used, but these tools assist in completing a focused task as ...
ADF Solutions’ Triage-Examiner is a forensic tool designed to be run on suspect computers to quickly analyze their content.
The F-Response Enterprise Edition forensic tool makes examinations in the corporate world much easier.
Mandiant Intelligent Response (MIR) is a powerful incident response investigation and evidence collection tool.
In the field of network forensics, the NIKSUN NetDetector is a user-friendly, all-in-one appliance.
The main function of Cyber Security Technologies P2P Marshal 3.1 Field Edition is to analyze peer-to-peer network downloads.
Since 2002, Paraben has been the major contributor to the hand-held data acquisition market.
NetWitness NextGen v9.5 is a network forensic tool that uses a combination of dedicated hardware and application software to provide a method for collecting and ...
WetStone’s Trait Analytic Profiling Search (TAPS) provides investigators with a simple but important commodity: time.
Forensic Toolkit, or FTK, as it is generally known, is a mainstay of the computer forensic world.
At its heart, ProDiscover IR is a computer forensic program that analyzes the computer media.
The NitroView is characterized by speed and the ability to accept data from just about any source to store huge amounts of historical data.
The SIEM product from CorreLog provides organizations with an easy-to-implement, affordable log management and correlation system.
The MX3020 from LogLogic encompasses the high-grade SIEM functionality of the company’s larger offerings in a single appliance for smaller to midsize environments.
The LogRhythm appliance features high-powered functionality to the enterprise in the way of log correlation and full, real-time event analysis with massive bells and whistles.
The nFX Cinxi One appliance from netForensics provides powerful tools to manage and correlate logs for real-time threat analysis and identification.
The EventTracker from Prism Microsystems provides an interesting set of features.
InTrust from Quest Software provides a server-based log collection and analysis tool for Windows and Linux/Unix systems, as well as syslogs, applications and databases.
The TriGeo SIM focuses on a proactive network defense principle by combining functions with built-in active response techniques for full-scale visibility of risks and suspicious ...
Tripwire Log Center collects logs, and after the logs are collected and correlated, the Log Center offers real-time event alerting based on custom-made rules that ...
The Trustwave SIEM offers the ability to collect, normalize and analyze logs and events for use in forensic investigation and auditing.