CISO October 30, 2017 Don’t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity 3 min read - To deal with the daily pressures of the job, CISOs need a cybersecurity strategy that promotes cross-departmental collaboration and clear communication.
October 19, 2017 Sniffing Out Snoops to Improve Network Security for Business 2 min read - In a recent survey, security professional and executives admitted to snooping on enterprise data. How can companies improve network security for business?
Identity & Access September 19, 2017 Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey 6 min read - Identity governance and administration process engineering remains a challenge despite growing awareness about the importance of IGA and IAM processes.
Data Protection September 14, 2017 See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management 3 min read - A risk-focused data management program can help companies identify and protect their prized assets from attackers aiming to steal, publish or destroy them.
Intelligence & Analytics September 13, 2017 From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation 3 min read - To protect corporate data from insider threats, security teams should leverage cognitive-enabled UBA and IGI solutions to measure users' risk scores.
CISO September 11, 2017 The CISO’s Guide to Managing Insider Threats 4 min read - To effectively manage and remediate insider threats, the CISO must establish a comprehensive approach to governance, data analysis and incident response.
Risk Management September 6, 2017 Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting 3 min read - Threat hunting enables security teams to improve incident response speed and accuracy. It also empowers them to remediate threats proactively.
Energy & Utility September 6, 2017 Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase 2 min read - According to IBM X-Force data, cybercriminals have been targeting industrial control systems in the energy and utilities sector at an increasing rate.
August 28, 2017 Insider Threats Account for Nearly 75 Percent of Security Breach Incidents 2 min read - Several recent studies confirmed that a security breach is often caused by an insider threat, including rogue employees or human error.
Data Protection August 10, 2017 Seeing Data Security Breaches With Your Own Eyes 3 min read - The new Data Insight feature for IBM Security Guardium enables analysts to more effectively monitor database access during security breaches.