Information Security


Leveraging Graph Technology to Securely Grant Employee Access

November 12, 2015 Added by:Emil Eifrem

Good access management requires a comprehensive and intelligent system in place for quick and accurate identification of an individual’s right to view certain information. This means a more granular and flexible approach to control is needed. This is where graph databases can help.

Comments  (0)


File Insecurity: The Final Data Leakage Frontier

November 11, 2015 Added by:Scott Gordon

In today’s digitally collaborative business, file security must accommodate a broader set of applications, constituents and collaboration mechanisms including the use of cloud-based storage and sharing platforms.

Comments  (0)


How Well Do You Really Know Your Network?

October 06, 2015 Added by:Dan Lohrmann

Recent data breaches, and the international emphasis on critical infrastructure protection, are helping raise awareness of the importance of technology infrastructure improvements. Many organizations are currently building “next-generation” networks with new projects that are well funded. Don’t waste any opportunity to reinvent your network or infrastructure when you get the chance.

Comments  (0)


The Necessity of Cloud Delivered Integrated Security Platforms

September 28, 2015 Added by:InfosecIsland News

Forrester Consulting conducted an assessment of both integrated security platforms and cloud computing/software-as-a-service (SaaS)-based delivery models. Join SecurityWeek and Zscaler for a compelling webcast full of key insights and findings from this research, including:

Comments  (0)


A Sharing Economy for Security

September 25, 2015 Added by:Anne Bonaparte

Hackers trade information to make their attacks more effective. If organizations want to beat back the bad guys, they must also learn to share.

Comments  (0)


3 out of 4 Consumers Will Leave your Websites Because of Security Concerns

September 22, 2015 Added by:Peter Zavlaris

As part of the ongoing battle for eyeballs, marketing departments implement tracking technologies that encroach on customer privacy, while digital assets are cobbled together from third-party technology to accelerate time-to-market.

Comments  (0)


Webcast: Segmentation Beyond VLANs, Subnets, and Zones

September 01, 2015 Added by:InfosecIsland News

In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.

Comments  (0)


Businesses Should Take a Pass on Traditional Password Security

August 04, 2015 Added by:Geoff Sanders

Historical forms of authentication were never meant for the networked landscape we live in today. The first passwords were adequate authentication solutions only because the systems they secured were isolated. Unfortunately, the isolated systems that pervaded the early days of the computer revolution has set the foundation for authentication in the Internet Age.

Comments  (0)


How to Tell a Landscaper From a Thief

July 20, 2015 Added by:Or Katz

Casually dismissed attack reconnaissance should be considered as valuable information and should be treated as such.

Comments  (0)


The Current State of Insecurity: Strategies for Inspecting SSL Traffic

April 17, 2015 Added by:Kasey Cross

Encrypted network traffic improves confidentiality and message integrity, but it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. Attackers are wising up and taking advantage of this gap in corporate defenses.

Comments  (0)


Preview: Suits and Spooks London - May 6-7, 2015

April 16, 2015 Added by:Eduard Kovacs

With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.

Comments  (0)


FireEye Reveals APT30: A Decade-Long Cyber Espionage Campaign Targeting South East Asia

April 12, 2015 Added by:Mike Lennon

FireEye on Sunday uncovered details of a decade-long cyber espionage campaign carried out by China targeting governments, journalists and businesses in South East Asia and India.

Comments  (0)


Suits and Spooks DC 2015: The Agenda - Last Chance to Register

January 29, 2015 Added by:Mike Lennon

Suits and Spooks DC is less than one week away! The event will be held at the Ritz-Carlton, Pentagon City on February 4-5. Due to multiple sell-out events, we have expanded our attendee capacity to 200, but the event is again close to being sold out.

Comments  (2)


Three Compliance Trends to Watch in 2015

January 26, 2015 Added by:Mav Turner

Continuous compliance involves constantly reviewing processes and quickly making any necessary updates as a result of deviations from their intended performance. However, despite the fact that continuous compliance is effective at eliminating the gaps between compliance and security, it also greatly increases the complexity of managing compliance.

Comments  (2)


The Five Things CSOs Need to Know About Software-Defined Security

January 19, 2015 Added by:Carson Sweet

Software-defined security changes the game for the CISO and their teams. Security can now move to being an enabler for enterprises that are taking advantage of the business value offered by cloud services and infrastructure, without sacrificing security or compliance.

Comments  (2)


When You Are Overwhelmed With Alerts, it is Time to Automate.

January 07, 2015 Added by:Michael Leland

Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »