Main Nav

Search results

Showing 1 - 10 of 24 Results

Sort by:

Overview of Bro
October 30, 2013

An increasing number of institutions are recognizing the need to log network data in large volume and to analyze the data efficiently to detect sophisticated network intrusion attempts affect…

Cybersecurity: Selected Legal Issues
July 23, 2012

The federal government’s role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly …

Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012

Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…

Complex Systems, Simplified Operations
December 22, 2009

Key Takeaways As organizations adopt a decentralized model based on distributed systems with a wide variety of configurations, staffing the operations center with personnel possessing the n…

Are universities protecting students from the RIAA?
October 18, 2007

The author suggests that schools may be purposely not retaining IP logging data on students to protect them from copyright infringement lawsuits. …

Do You Know Where Your Data Are?
January 1, 2006

Viewpoint Do You Know Where Your Data Are? A useful new tool in the information security kit—outbound content monitoring and filtering—can help prevent sensitive data loss B y C…

Evaluating Computer-Related Incidents on Campus
January 1, 2004

Research in Brief Evaluating Computer-Related Incidents on Campus The CIFAC Project looks at current trends in how incidents are discussed, categorized, and managed By Daniel Roths…

T3 Software Builders - Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring
January 1, 2004

Increasing reliability without increasing costs is not as impossible as it may sound. This session will present an overview of a monitoring application, SiteMaestro, in the context of a case study …

How Advanced Log Management Can Trump SIEM: Tales of Woe and Glory
April 16, 2013 | A session at the Security Professionals Conference

Network situational awareness is a prerequisite for mature information security operations. Achieving and maintaining a sufficient level of situational awareness is a challenge, often amplified i…

How Secure Is Your Information?
March 30, 2011 | A session at the NERCOMP Annual Conference 2011

This dynamic session will provide a brief overview of the information security standards institutions must comply with in order to provide data security. The program will include some live demonstr…