Banking & Finance August 27, 2014 4.5 Million Patient Records Stolen in CHS Data Breach — What’s Next? 2 min read - Community Health Systems has reported that it was the target of a data breach, demonstrating how vulnerable the health care industry is to attacks.
Intelligence & Analytics August 20, 2014 What Are the Best Network Forensics and Data Capture Tools? 3 min read - An analysis of the top data capture and network forensics tools across six common criteria. See which incident forensics solution scored the best overall.
August 11, 2014 IBM Acquires Lighthouse to Help Streamline IAM for Mobile, Social and Cloud 2 min read - Streamlining Identity and Access Management (IAM) for Mobile, Social and CloudImprovements in the digital community have exacerbated the challenges of...
CISO August 4, 2014 Building Cyber Security Right From the Start 2 min read - Cyber security and privacy protection need to be built into the design of systems, not added as an afterthought, in order to properly protect them.
CISO July 24, 2014 Cyber Security Threats Gain Boardroom Attention 2 min read - According to a recent study, cyber security threats have become the number-one concern of corporate boards because of their possible scale and cost.
Retail July 15, 2014 Cyber Security Challenges: How Do Retailers Protect the Bottom Line? 4 min read - While the rise of e-commerce and cloud data storage have proven to be a boon for consumers, a host of security challenges have emerged for retailers.
Intelligence & Analytics May 22, 2014 Blurred Vision: The Case for Security Intelligence 4 min read - Successfully detecting insider fraud and advanced threats requires gathering and analyzing a broad collection of IT security information. An effective security intelligence platform helps organizations filter through the billions of daily log source events and network flows to find the…
Advanced Threats May 6, 2014 3 Advanced Threat Protection Essentials 5 min read - Today's advanced attacks are more targeted and complex than ever. When it comes to advanced threat protection (ATP), you need an integrated approach.
Advanced Threats May 5, 2014 An Intelligent Approach to Stopping Advanced Threats 4 min read - Organizations require an intelligent approach to protecting their critical data against advanced threats, zero-day attacks and breaches.
Fraud Protection February 19, 2014 The Syrian Electronic Army Strikes Again: Over 1 Million Emails, Passwords Exposed 2 min read - The Syrian Electronic Army gave Forbes and the rest of the Internet an ugly new reason to not use the same login information across multiple accounts.