Tuesday, October 2, 2018

SOC services: How to find the right provider for your company

TechTarget
Latest Technology News & Expert Advice     October 02, 2018
TechTarget
Issue Highlights:
SOC services: How to find the right provider for your company
A security operations center for hire? Something to consider
Definition: honeypot (honey pot)
How entropy sources help secure applications with SDLC
AI and machine learning in network security advance detection
SOC services: How to find the right provider for your company
SOCs are the latest services you can now outsource rather than build in-house. But should you entrust them to a third party? Yes—but make sure you know how to pick the best.
A security operations center for hire? Something to consider
There are some good reasons your company should consider hiring a third party to provide SOC services, but certain aspects of security operations should be kept in-house.
Definition: honeypot (honey pot)
A honeypot is a computer system that is set up to act as a decoy to lure cyberattacks and to detect, deflect, or study attempts to gain unauthorized access to information systems.
How entropy sources help secure applications with SDLC
Some applications need cryptographic algorithms to test and work properly. Expert Judith Myerson discusses this division in terms of the software development lifecycle.
AI and machine learning in network security advance detection
Applying AI, and specifically machine learning, in network security helps protect enterprises against advanced persistent threats and sophisticated cybercriminals.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

No comments: