Intelligence & Analytics February 10, 2020 How to Create Value With Your (Security) Data Analytics Program 4 min read - The key factor in the success of any data analytics program, security-focused or otherwise, is how efficient and business-fit the underlying data architecture is.
Intelligence & Analytics August 6, 2018 7 Ways to Identify Darknet Cybersecurity Risks 5 min read - Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence.
Data Protection February 18, 2015 Using Outlier Detection to Catch Sneaky Data Breaches 5 min read - Organizations should use outlier detection tools to spot anomalies in their systems that could result in potentially damaging threats.
Data Protection September 5, 2014 Free Mobile Apps: What Is the Cost of These Permissions? 5 min read - There's no such thing as a "free" app. What data are free mobile apps collecting, how is it used and what can companies do to protect themselves?