Security operations center

Results: 560



#Item
21Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
22

Gordon Center for Integrated Science Operations Handbook Security For emergencies – Contact University of Chicago Police (“123” orFor non-emergencies – Contact the Building Manager, Sonny Debrito, at (773

Add to Reading List

Source URL: ibd.uchicago.edu

Language: English - Date: 2015-03-14 20:24:23
    23Network management / Computer security / Data security / System administration / Computer systems / SolarWinds / Security information and event management / Log management / Information security operations center / User Activity Monitoring / TriGeo Network Security

    CTA_Free_Trial_Button_Green

    Add to Reading List

    Source URL: cdn.swcdn.net

    Language: English - Date: 2015-10-20 12:51:43
    24Computing / Security engineering / Computer security / Security / Computer network security / Sqrrl / Threat / Cyberwarfare / Cybercrime / E-commerce / Big data / Information security operations center

    DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2016-02-15 14:44:42
    25

    DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2016-02-15 14:44:42
      26Security / Computing / Computer security / Cyberwarfare / Computer network security / Cybercrime / National security / Threat / Information security operations center / Abuse / United States Computer Emergency Readiness Team / New Jersey Cybersecurity and Communications Integration Cell

      AbuseSA Build a More Resilient World KEY ABUSESA FEATURES: • Automated Data Collection

      Add to Reading List

      Source URL: www.codenomicon.com

      Language: English - Date: 2016-03-02 04:58:12
      27Modeling and simulation / United States Army Tank Automotive Research /  Development and Engineering Center / Warren /  Michigan / Operations security / United States Army TACOM Life Cycle Management Command / Security

      PDF Document

      Add to Reading List

      Source URL: www.ndia-mich.org

      Language: English - Date: 2013-08-20 07:59:50
      28Cyberwarfare / Advanced persistent threat / Security event manager / Hunting / Computer security / Security / Computer network security

      DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

      Add to Reading List

      Source URL: sqrrl.com

      Language: English - Date: 2015-05-22 14:48:50
      29

      Global Cyber Solutions Center Dulles, Virginia Providing a fully functional cyber security operations center, the Raytheon Global Cyber Solutions Center enables demonstrations

      Add to Reading List

      Source URL: www.raytheoncyber.com

      Language: English - Date: 2015-06-16 13:22:18
        30

        DEPARTMENT OF HEALTH & HUMAN SERVICES Health Care Financing Administration Center for Medicaid and State Operations 7500 Security Boulevard Baltimore, MDDecember 29, 1999

        Add to Reading List

        Source URL: www.medicaid.gov

        - Date: 2015-05-31 18:06:32
          UPDATE