David Sherry, the CISO at Brown University, describes the steps taken to secure student information without inhibiting information sharing.
The Ashley Madison security breach has everyone talking, but what's the takeaway from this affair for corporations looking to improve cybersecurity?
Guardium lets security teams automatically analyze their data environment, minimize risk, protect sensitive data and seamlessly adapt to change.
Winning the Triple Crown of data security means being able to protect your sensitive information while also analyzing and adapting your security practices.
IBM Security includes two great offerings that offer insights into the security of the enterprise: QRadar Security Intelligence Platform products provide a unified architecture for integrating security information and event management (SIEM), log...
An intelligent personal assistant (IPA) can be of tremendous help to individuals, but it may pose a security risk if users aren't careful.
The QRadar SIEM solution applies security intelligence and advanced analytics to millions or even billions of security events per day.
Data Activity Monitoring and Data Loss Prevention: A Balanced Approach to Securing Your Critical Assets
Security teams need to invest in data activity monitoring and data loss prevention if they expect to prevent damaging breaches.
Every endpoint connected to your system is a point of vulnerability. It takes compromising only one for attackers to infiltrate your entire infrastructure.
A loyalty program is framed as a win-win for organizations and their customers, but it can also offer prizes for cybercriminals if not managed properly.