NitroSecurity

Displaying 1 - 10 of 23 results

  • Critical Control System Vulnerabilities Demonstrated - And What to Do About Them

    Webcasts // Nov 2011 // provided by NitroSecurity

    Control systems are embedded in most industries to automate the production, delivery and safe storage of the food and drinks the people consume, the transportation people take, the chemicals people process, and the energy people utilize. These systems, some of which are being connected directly to the Internet, are increasingly ...

    Watch Now
  • Monitoring and Securing SCADA Networks

    Webcasts // Oct 2011 // provided by NitroSecurity

    SCADA networks are just different. Compared to enterprise IT networks, they have different security objectives, most of the endpoint actors are machines rather than people, their incidents can have immediate physical consequences, and they are more likely to be targeted by hostile actors such as terrorists. Moreover, SCADA networks must ...

    Watch Now
  • Security Management 2.0: Time to Replace Your SIEM?

    Webcasts // Sep 2011 // provided by NitroSecurity

    In this webcast, the presenters say about the reality is that many organizations have spent millions and years trying to get productivity out of their SIEM - with mediocre results. Most security teams need to start asking themselves some key questions: Is it time? Any one waving the white flag? ...

    Watch Now
  • Actionable Intelligence From Advanced SIEM Systems

    Webcasts // Jul 2011 // provided by NitroSecurity

    In this webcast, the presenters say about to make better, faster security decisions for one organization, one need better information faster. Capturing the existing network event, log and flow data already provided by one infrastructure with a Security Information and Event Monitoring (SIEM) solution is the first key step to ...

    Watch Now
  • Detecting Advanced Threats With New Risk Score Correlation and SIEM

    Webcasts // May 2011 // provided by NitroSecurity

    In this webcast, the presenters say sophisticated malware and determined insiders present dual challenges for IT security teams. Insiders understand internal policies and operate "Within the rules," while advanced malware's persistence and stealth can evade most detection technologies.

    Watch Now
  • Securing ePHI With Effective Database Activity Monitoring

    Webcasts // Apr 2011 // provided by NitroSecurity

    In this webcast, the presenters say about electronic patient health information can be widely distributed throughout multiple databases within a provider's IT infrastructure. Monitoring and logging all database activity to ensure that sensitive data is being accessed appropriately, and by the right people, is critical to preventing costly and embarrassing ...

    Watch Now
  • Detecting Advanced Threats and Malware With SIEM

    Webcasts // Apr 2011 // provided by NitroSecurity

    In this webcast, the presenters say about many organizations have deployed Security Information and Event Management (SIEM) solution to meet regulatory compliance requirements, high performance SIEM solutions can do much more. By correlating events, logs, and network flows SIEMs can uncover a range of diverse "Low and slow" attacks.

    Watch Now
  • 3 Key Factors Driving Effective ePHI Monitoring

    Webcasts // Mar 2011 // provided by NitroSecurity

    In this webcast, the presenters say about monitoring and auditing healthcare provider systems that store, manipulate or transmit electronic patient health information is becoming significantly more important. The interim Breach Notification Rule that came out in late 2009 increased the need to be able to accurately identify who had accessed ...

    Watch Now
  • SC eConference: PCI Compliance That Makes Systems Secure

    Webcasts // Mar 2011 // provided by NitroSecurity

    In this webcast, the presenters say about the many demands noted in the PCI Data Security Standard is no small feat, as many information security pros well know. And while there are many who claim they're in line with these industry regulations, they find themselves still getting victimized by cybercriminals. ...

    Watch Now
  • The Trusted Insider Threat - Lessons Learned From WikiLeaks

    Webcasts // Jan 2011 // provided by NitroSecurity

    In this webcast, the presenters say about protecting against and detecting potential data leakage is at the heart of the WikiLeaks controversy. However there is no "One size fits all" solution. It must be addressed at multiple levels with collaborating technologies, including SIEM, database monitoring and application monitoring, to provide ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?