Blog Posts Tagged with "Business Intelligence"
July 09, 2012 Added by:Tripwire Inc
In conversations with infosec executives, a common question is “What should I really be measuring?,” or they make comments like “I report on a lot of things, but I am not sure what the top security indicators are that I should roll up to my executive team.” Here are the five characteristics of effective metrics...
April 19, 2012 Added by:Bill Gerneglia
This expanding rate of potential threats call for a new way to approach corporate data security. The latest approach is one that is based on intelligence and BI tools. Security intelligence applies advanced analytics and automation technology to the collection of information from hundreds of sources across an organization...
November 10, 2011 Added by:Brent Huston
As the battle rages, attackers look for every angle they can leverage in order to access your data. Our team has spent countless hours discussing the importance of identifying what ‘valuable data’ means, learning where that data lives, and understanding how it is accessed...
November 08, 2011 Added by:Joel Harding
Information is power. Those who control information understand they wield a very powerful tool, they share information with only those they decide need to see that information. One who controls information within an organization can manipulate others, whether consciously or unconsciously...
August 11, 2011 Added by:Bozidar Spirovski
Regardless of whether you need to collect information on a potential competitor, the target of a penetration test, for financial spread betting and derivatives trading, or even for financial research of a company there are several lessons that the "The Big Short" teaches us...
February 09, 2011 Added by:Rahul Neel Mani
Open source BI tools do not have the same richness of features that the large BI tools have. There is a downside to this gap because many people have a need for those more advanced features. The good is that the open source products are less complex to configure and use for basic purposes...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013