1. EachPod

Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks

Author
CyberSecurity Summary
Published
Sat 11 Jan 2025
Episode Link
https://www.spreaker.com/episode/security-monitoring-proven-methods-for-incident-detection-on-enterprise-networks--62763059

This excerpt from the book "Network Security Monitoring" by Chris Fry and Martin Nystrom provides guidance on how to monitor network security effectively. The book focuses on targeted monitoring, which involves using a combination of policies, network knowledge, and event sources to identify security risks. The authors emphasize the importance of having documented network information, including IP addresses, subnets, and network functions, to provide context for security alerts. The book discusses how to analyze security events, including system logs, NIDS alerts, and NetFlow data, and provides strategies for configuring and managing monitoring systems. Examples and case studies illustrate best practices for monitoring specific networks, identifying potential threats, and mitigating security risks.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Get the Book now from Amazon:
https://www.amazon.com/Security-Monitoring-Incident-Detection-Enterprise/dp/0596518161?&linkCode=ll1&tag=cvthunderx-20&linkId=bcd4ff6bcad1b256052eba45aa1d6619&language=en_US&ref_=as_li_ss_tl

Share to: