RSS feed Get our RSS feed

News by Topic

automated attacks

Results 1 - 3 of 3Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Mar 31, 2017
The concept of SIEM orchestration provides immediate, automated responses. It is the only way for a modern enterprise to protect against advanced attacks.
Tags : secops, siem, soc, orchestration, threat intelligence, epo, automation, process integration
     McAfee
By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is to—as quickly as possible—detect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : computer viruses, automated attacks, encryption, deceptive packaging, security controls, security
     Symantec
By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : lumension, unix, linux, web 2.0, windows, cve
     Lumension
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics