======================================================================== CTO SOURCE http://www.infoworld.com ======================================================================== Tuesday, November 2, 2004
TOP STORIES ======================================================================== * Surveying the threatscape * Big picture security * In search of security event standards * e-Security delivers the big security picture * Network Intelligence device gobbles up log files ADVERTISEMENT -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- The Mid-Atlantic Technology Conference and Exhibition December 1 & 2, 2004, The Baltimore Convention Center For readiness...For Growth...For the Region. The MTCE is currently accepting exhibitors. The MTCE All Hazards Forum will provide the opportunity to meet regional, federal, state and local government officials and planners, homeland security practitioners, industry leaders and innovators, and policy influencers working with homeland security and emergency management. For more information, http://newsletter.infoworld.com/t?ctl=9B3B71:2B910B2 or contact Diana Edelman, 301-493-5500, [EMAIL PROTECTED] -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Surveying the threatscape ======================================================================== Posted October 29, 2004, 3:00 p.m. Pacific Time IT is awash in data from firewalls, server logs, anti-virus software, app security appliances, and intrustion protection systems. Security event management systems aggregate and correlate that data, offering deep reports and dashboard views that help identify real threats. For the full story: http://newsletter.infoworld.com/t?ctl=9B3B6B:2B910B2 Big picture security ======================================================================== Posted October 29, 2004, 3:00 p.m. Pacific Time There was a time when cutting-edge network security meant a firewall on your perimeter and anti-virus software on the desktop. No longer. With the advent of polymorphic Internet worms, application-layer attacks, Trojan horses, adware, spyware, and wireless hacks, the network security picture is more complicated than ever. For the full story: http://newsletter.infoworld.com/t?ctl=9B3B62:2B910B2 In search of security event standards ======================================================================== Posted October 29, 2004, 3:00 p.m. Pacific Time Integrating SEM (security event management) technology with existing security and system management infrastructure can be a hair-raising experience. Security point products such as IDSes, anti-virus gateways, and vulnerability scanners tend to use proprietary formats for reporting, recording network events, and issuing alerts. And the standard formats that do exist -- such as SNMP and syslog files -- are limited in what they can convey. For the full story: http://newsletter.infoworld.com/t?ctl=9B3B5D:2B910B2 e-Security delivers the big security picture ======================================================================== Posted September 17, 2004, 3:00 p.m. Pacific Time One of the first things you notice when you start working with IDSes is that they produce a lot of data. In fact, this flood of data can be so overwhelming that the usefulness of products such as Snort can become questionable. Yes, you can eventually tune them so that they filter out some of the noise, but that can require an investment in staff hours nearly as vast as the deluge of data itself. And that's only one source. Add to this the streams of data from your firewalls, the log files from your servers, and reports from vulnerability management products and other network devices, and your management picture goes from being difficult to basically hopeless. For the full story: http://newsletter.infoworld.com/t?ctl=9B3B60:2B910B2 Network Intelligence device gobbles up log files ======================================================================== Posted July 09, 2004, 3:00 p.m. Pacific Time Log files alternate between extremely valuable and extremely irritating, depending on the task at hand, but the real effort involves analyzing the data. For the full story: http://newsletter.infoworld.com/t?ctl=9B3B69:2B910B2 ======================================================================== Now the InfoWorld Test Center reports to you It's like having your own multimillion dollar IT test facility, with lab reports in your inbox each Monday. The weekly "Test Center Report" newsletter delivers product and technology evaluations, trend analysis, and advice from the legendary InfoWorld Test Center. It will save you lots of time - and maybe money, too. But it's free, fast, and easy to subscribe. Sign up now at http://newsletter.infoworld.com/t?ctl=9B3B64:2B910B2 ADVERTISE ======================================================================== For information on advertising, contact [EMAIL PROTECTED] UNSUBSCRIBE/MANAGE NEWSLETTERS ======================================================================== To subscribe, unsubscribe or change your e-mail address for any of InfoWorld's e-mail newsletters, go to: http://newsletter.infoworld.com/t?ctl=9B3B66:2B910B2 To subscribe to InfoWorld.com, or InfoWorld Print, or both, or to renew or correct a problem with any InfoWorld subscription, go to http://newsletter.infoworld.com/t?ctl=9B3B6F:2B910B2 To view InfoWorld's privacy policy, visit: http://newsletter.infoworld.com/t?ctl=9B3B6D:2B910B2 Copyright (C) 2004 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107 This message was sent to: [EMAIL PROTECTED]
