Information security operations center

Results: 147



#Item
1A Human Capital Model for Mitigating Security Analyst Burnout Sathya Chandran Sundaramurthy  Kansas State University

A Human Capital Model for Mitigating Security Analyst Burnout Sathya Chandran Sundaramurthy Kansas State University

Add to Reading List

Source URL: www.usenix.org

Language: English
2SOLUTION SHEET  Big Data Analytics Making all Machine Data Accessible, Usable, Valuable  WHY GTRI

SOLUTION SHEET Big Data Analytics Making all Machine Data Accessible, Usable, Valuable WHY GTRI

Add to Reading List

Source URL: www.gtri.com

Language: English - Date: 2016-03-15 18:34:14
3COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE DEPARTMENT OF HOMELAND SECURITY “Systems of Records Notice” DHSand

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE DEPARTMENT OF HOMELAND SECURITY “Systems of Records Notice” DHSand

Add to Reading List

Source URL: epic.org

Language: English - Date: 2010-12-16 17:34:47
4Microsoft PowerPoint - 0_(Warner)_Cyber_Training_Intro_v5.pptx

Microsoft PowerPoint - 0_(Warner)_Cyber_Training_Intro_v5.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 17:08:13
5RSA ADVANCED SECURITY OPERATIONS CENTER SOLUTION Pervasive Visibility, Rapid Detection, Effective Response OVERVIEW and behavior analysis models to detect and

RSA ADVANCED SECURITY OPERATIONS CENTER SOLUTION Pervasive Visibility, Rapid Detection, Effective Response OVERVIEW and behavior analysis models to detect and

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-06-29 17:01:32
6Case Study  LA Metro Uses Hiperwall Video Walls to Monitor Metro Rail and Bus System  Hiperwall provides visualization of LA Metro, enabling situational

Case Study LA Metro Uses Hiperwall Video Walls to Monitor Metro Rail and Bus System Hiperwall provides visualization of LA Metro, enabling situational

Add to Reading List

Source URL: hiperwall.com

Language: English - Date: 2016-07-12 20:19:18
7

PDF Document

Add to Reading List

Source URL: ics.sans.org

Language: English - Date: 2015-12-09 15:17:34
8SECURITY PROFESSIONAL SERVICES  Security Professional Services Augmenting Security Staff, Addressing Skill Shortages and Optimizing Your Security Operations With Splunk

SECURITY PROFESSIONAL SERVICES Security Professional Services Augmenting Security Staff, Addressing Skill Shortages and Optimizing Your Security Operations With Splunk

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-17 08:31:42
9THREAT DETECT DIAGRAM v10 CTP copy

THREAT DETECT DIAGRAM v10 CTP copy

Add to Reading List

Source URL: www.redscan.com

Language: English - Date: 2016-03-21 10:46:55
10Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern  Lazi

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41