Many organizations are hiring a security data scientist to support analysts and provide deep insights to the chief information security officer (CISO).
Encrypting your data is an important step for keeping it secure. Follow these tips to keep your data encryption project running smoothly.
Let's clear up the misinterpretations and explore the structural differences between big data, information, security intelligence and real intelligence.
A trip to a graveyard leads to insights on why turning massive volumes of data into security intelligence can be so difficult — and how to simplify it.
How Security Intelligence and Incident Forensics enable security operations teams to quickly find malicious attackers.
A company may have amassed significant amounts of information assets consisting of trade secrets, proprietary designs, merger and acquisition plans, board deliberations and other highly sensitive assets. These assets must be properly controlled and...
Let's take a fresh look at the latest healthcare data breach numbers and the most up-to-date figures available. The healthcare industry is making progress in some areas, but is overall struggling to clot the wound bleeding patient data.
The tools of encryption and key management can (and should) be applied at numerous layers of business to protect, isolate, and control data. The technology is well-know and standardized. It is predictable and manageable and in no-way should be...
Why are people afraid to protect their information by encrypting their data? Why is encryption often the protection mechanism of last resort? Unfortunately, encryption is often perceived as complex, something akin to rocket science.