Application Security October 29, 2015 Have Legacy Web Applications Become a Privacy Problem? 2 min read - Many legacy Web applications are still in use, but they need to receive a security overhaul if they are to remain viable in today's world.
Data Protection October 28, 2015 Two Important Lessons from the Ashley Madison Breach 5 min read - The Ashley Madison data breach was one of the most notable of 2015 so far, and there are several security lessons buried in the scandalous headlines.
CISO October 28, 2015 Phones, Drones and Clones: The Path to Cognitive Privacy 3 min read - Enterprises and individuals need to take the lead when it comes to security and privacy in today's complex world — just as they have for decades.
Intelligence & Analytics October 27, 2015 Bridging the Gap Between Security Intelligence and Data Protection 3 min read - Security intelligence and data protection tools should work together to provide a comprehensive and proactive approach to data security.
Data Protection October 26, 2015 Stop Unknown Threats Before You’re Breached: Apply Analytics to the Challenge of Security 3 min read - Security tools can help organizations lock down critical data, and the most advanced options enhance data protection with intelligence and analytics.
Data Protection October 22, 2015 Be the Power Behind the Throne: Create a Secure Environment for Big Data 4 min read - By getting ahead of the big data trend, you can become the power behind the throne and enable business success, all while keeping that data secure.
Data Protection October 20, 2015 More Than a Pretty Face: Usability Can Impact Bottom Line for Data Security 2 min read - The usability of security tools can have a major impact on their effectiveness, as well as the efficacy of an organization's data security practices.
October 14, 2015 Out in the Rain: Malware-Makers Extradited in US-EU Umbrella Agreement 2 min read - After four years, the US-EU Umbrella Agreement for cybersecurity is making progress. Soon, malware creators may have nowhere to hide.
Cloud Security October 12, 2015 The 2015 Rugby World Cup and Cybersecurity 2 min read - As the Rugby World Cup 2015 continues, we ponder the cybersecurity arena and highlight areas of interest from wearable technology to encryption.
Data Protection September 30, 2015 The Dollars and Cents of Protecting Your Data 3 min read - A new survey highlighted that organizations using IBM Security Guardium for their data security were able to find success with security and compliance.