Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts.

Speed and Scalability Matter

SANS Review of LogRhythm 7 SIEM and Analytics Platform Enterprise-level security is no easy task. To detect, respond, and remediate advanced threats (and the vulnerabilities that cause them) security teams must get the most out of each security tool they…

Read More

The Critical Infrastructure Attack Surface

Assessing Its Breadth, Fragility, Threats and Defenses The recent DDoS attack on Dyn did much more than simply disrupt service to websites of some of the biggest online brands. It caused many to question our definition of critical infrastructure and…

Read More

SOC it to Me

Building A Modern Security Operations Center A SOC is a major component of a company’s GRC operations, as well as a critical IT center. But you know that having your own SOC means more than just employing a couple of…

Read More

Understanding Office 365 Unified Audit Logging

Watch the On-Demand Webinar Office 365 provides a centralized audit logging facility that allows you to track what’s happening in Azure Active Directory, Exchange Online, SharePoint Online, and OneDrive for Business. This new auditing feature is different than auditing logging…

Read More

Building the Next-Gen Security Operations Center (SOC)

To handle the skyrocketing volume of malware and cyber exploits, many enterprises are building SOCs that provide a central place for detecting, diagnosing, and remediating online attacks. Thanks to the development of new capabilities and technologies, today’s security operations center…

Read More

How To Get Your Hands Around Security Analytics

Your Guide to Security Analytics “Big data” has dominated the enterprise market lately, with businesses wanting to filter their data using analytics tools. But what does all of this really mean? How can security analytics help a company perform more…

Read More

NetMon & Behavior Analysis

Achieve Real-Time Network Visibility When attackers compromise the perimeter or are operating from within, you need to know. You can only stop attackers from gaining a foothold in your network to expand their presence if you can see them. The…

Read More

Triage: The Art of Threat Detection and Risk Assessment

In healthcare, medical professionals use triage procedures to quickly assess, prioritize and allocate the right resources to treat patients, adjusting their response to the severity of the situation. Similar to healthcare, today’s cybersecurity teams are dealing with a constant barrage…

Read More

Activated Charcoal

Making Sense of Endpoint Data Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends,…

Read More

Beyond the Sticker Price

Factors Impacting the Total Cost of Ownership of a SIEM Many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that…

Read More

Top 8 Things to Analyze in Outbound Packets

Most modern malware operates as part of a system. Whether it’s a multi-part kill chain with droppers and payloads, a botnet with command and control servers, or ransomware encrypting files, the malware on the compromised system talks to other systems…

Read More