Thursday, February 1, 2018

Considerations for developing a cyber threat intelligence team

TechTarget
Latest Technology News & Expert Advice     February 01, 2018
TechTarget
Issue Highlights:
Considerations for developing a cyber threat intelligence team
The tug of war between user behavior analysis and SIEM
User behavior analytics leads the security analytics charge
IT sabotage: Identifying and preventing insider threats
Security behavioral analytics: The impact of real-time BTA
Considerations for developing a cyber threat intelligence team
The use of a cyber threat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee.
The tug of war between user behavior analysis and SIEM
Information security technologies embrace user behavior analytics, and the trend is expected to continue. Should CISOs consider a standalone UBA component?
User behavior analytics leads the security analytics charge
Will no longer playing by the rules help companies find insider threats? As user and entity behavior analytics gets closer to SIEM tools, enterprises take notice.
IT sabotage: Identifying and preventing insider threats
Preventing IT sabotage from insider threats can be a challenge. Peter Sullivan explains how enterprises should monitor for characteristics of insider threat behavior.
Security behavioral analytics: The impact of real-time BTA
Johna Till Johnson, CEO and founder of Nemertes Research, explains real-time threat analysis in terms of BTA and its next-generation security architecture.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

No comments: