Enterprise Security

Ebb72d4bfba370aecb29bc7519c9dac2

Why No Security Analytics Market?

July 10, 2014 Added by:Anton Chuvakin

So, occasionally I get this call from somebody (vendor, end-user, investor, etc) inquiring about“the size of the security analytics market.” They are usually shocked at our answer: since there is no such market, there is no size to report.

Comments  (0)

4e9404278ec48b9cce4fcfa8ca048c29

Defense in Depth for Advanced Threat Protection

July 09, 2014 Added by:Alain Mayer

I believe that defense in depth – a long-established information assurance concept – can help in developing a sensible strategy for the evolving threat landscape.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Detecting and Preventing Advanced Persistent Threats

July 08, 2014 Added by:InfosecIsland News

Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.

Comments  (0)

C55430fdfdac11fc3771a9b94e2bb854

The Security Perimeter is Dead, Long Live the Security Perimeter

July 07, 2014 Added by:Dana Wolf

Forward-thinking companies that tend to be targeted by cyberattacks can no longer afford to play defense with their data assets. With no perimeter left to defend, they need to arm themselves with tools to fight the next battle, not the last one.

Comments  (0)

Default-avatar

How Enterprises Can Leverage SMS to Minimize Security Risks and Aftermath

July 03, 2014 Added by:Steve French

As a virtually ubiquitous technology enabling automation and reliable two-way communications worldwide, SMS mobile messaging has proven crucial for those enterprises with effective data security, incident management and business continuity measures in place.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

In Defense of Reactive Security

July 01, 2014 Added by:Rafal Los

Every one of us reacts to our environment, it's how we survive. And yet - when you say "reactive" security today you get looks from people like that's a dirty word.

Comments  (0)

6d117b57d55f63febe392e40a478011f

BSidesLV Preview: How to Make Your Security Program Not Suck

July 01, 2014 Added by:Anthony M. Freed

With the August 5th & 6th show fast approaching, we are continuing our series highlighting some of the coolest presentations that are scheduled to take place at Security BSides Las Vegas.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Choosing the Right Entry Point for a Software Security Program

June 30, 2014 Added by:Rafal Los

The topic of software security, or AppSec, has once again cropped up recently in my travels and conversations so I thought it would be prudent to address that here on the blog.

Comments  (0)

65be44ae7088566069cc3bef454174a7

10 Big Data Analytics Privacy Problems

June 30, 2014 Added by:Rebecca Herold

The power of big data analytics is so great that in addition to all the positive business possibilities, there are just as many new privacy concerns being created. Here are ten of the most significant privacy risks.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Essentials? Basics? Fundamentals? Bare Minimum?

June 25, 2014 Added by:Anton Chuvakin

Let’s think together – what technologies and practices constitute information security essentials?

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

What’s the Best Tool for the Job?

June 24, 2014 Added by:Jack Daniel

I thought back to my favorite patch and systems management tools from past jobs when I ran mixed (but mostly Windows) networks for small businesses. That reminded me of a lesson about tools I learned many years ago.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Last Chance to Register for Suits and Spooks New York

June 18, 2014 Added by:Mike Lennon

Suits and Spooks NYC will feature over 20 expert speakers in the areas of financial intelligence, special operations, information security, money laundering, and the protection of critical infrastructure.

Comments  (4)

E313765e3bec84b2852c1c758f7244b6

3 Tips for BYOD

June 18, 2014 Added by:Brent Huston

While much has been said about products and services that are emerging around this space, I wanted to tack back to 3 quick basics that can really help, especially in small and mid-size organizations.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

An Ounce of Big Data is Worth a Pound of Defense

June 17, 2014 Added by:Ali Golshan

In security circles, the concept of what constitutes prevention has shifted from as recently as five years ago, due to the growth in complexity of malware and growing maturity and sophistication of cybercriminals.

Comments  (0)

Ec47f9657c90a6db70e5e4f1cd1f7a02

The Struggle to Secure the New IT

June 16, 2014 Added by:Gretchen Hellman

Securing the New IT can seem daunting. However, by broadening your skillsets and seeking to have impactful conversations with business executives on the importance of security strategies and investments, it doesn’t have to be.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Global Response to Snowden Disclosures Revealed in New Report

June 12, 2014 Added by:Electronic Frontier Foundation

It has been one year since the first Snowden disclosure and in lieu of this first anniversary, world privacy expert and publisher of The Privacy Surgeon, Simon Davies, conceived and published a report titled “A Crisis of Accountability: A global analysis of the impact of the Snowden revelations.”

Comments  (10)

Page « < 3 - 4 - 5 - 6 - 7 > »