Information Security

Methods for Extending Visibility to Servers to Detect APT and Insider Abuse - Apr 11,2014

Play
Play
Share!

Share this Podcast

MyCast

MyCast

MyCast Subscription

Information Security

Caleb Barlow

IBM Massachusetts Laboratory

Description: IT Security Podcast from IBM

Most Recent Post

Methods for Extending Visibility to Servers to Detect APT and Insider Abuse - Apr 11,2014

Play Download media
Security and Information Event Managers (SIEM) tools rely heavily on perimeter security logs, like those from firewalls, IPS and router NetFlow, The sharing of these logs with SIEMs have been very successful in identifying sophisticated external attacks in very early stages. Now, for most organizations, the most severe data breaches are coming from privileged insiders or from Advanced Persistent Threats (APT) that imitate the privileged user. In this podcast Caleb talks with experts from Vormetric to explore if it is possible to use the tried and true SIEM and anomaly detection techniques with file system level log information to detect and identify APT and Insider abuse.

Last 5 Posts

Understanding Heartbleed - What you need to know. - Apr 09,2014

Play Download media
As security professionals scramble to address the potential impact of Heartbleed we take a moment to pause and describe what Heartbleed is all about, how it occurred and practical advice on how to address the risk on your systems. Michael Hamelin from the IBM X-Force research team joins us to descri...

Don't Risk Your Reputation or Your Mainframe - Jan 08,2014

Play Download media
Mainframes host mission critical corporate information and production applications for many financial, healthcare, government and retail companies requiring highly secure systems and regulatory compliance - making them a target for attack as your enterprise continues to grow and change. Demonstratin...

If everything is about the data, doesn't it make sense to protect it? - Jan 07,2014

Play Download media
Learn of the increased focus placed on data security, compliance, and privacy to deal with the constant threats to enterprises, and how a leading industry actor effectively makes data protection possible in their growing diverse IT ecosystem. As company's environments become more open and complex, s...

38 Millions Reasons to use Cryptography for Business - Dec 10,2013

Play Download media
Cryptography is a necessary component to for protecting data, regulatory compliance, and mitigating the risk of breaches, for government, retail, financial, and healthcare companies. Recent events in the news show how the a compromise of 38 million accounts could have been much worse if encryption h...

The Chameleon in Your Network --- Combatting the Mutating Threat - Nov 19,2013

Play Download media
Today's information security threats don't stand still. They persevere, adapting to traditional defenses, changing form and appearance quickly and frequently until they succeed in their mission --- to own your most critical assets. Without defense mechanisms that can accurately detect these types of...

Guest Book




Receive feedback for your podcast via SpeakPipe