Enterprise Security

3013a8d01542d3101f0a905ab013f00a

All Data is Security Data: A Shift in Thinking

August 30, 2018 Added by:Chris Jordan

Reviewing the data used in security operations shows that all data, not just security logs, are needed to operate efficiently.

Comments  (0)

Fb15a82ed0e5badeb14a485b672f0787

Conceptual and Technical Challenges in Multi-cloud Security

August 30, 2018 Added by:Zohar Alon

Becoming an expert with one cloud platform takes a lot of time and working with multiple clouds at the same time is more difficult and can make teams prone to errors.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

Why the World Needs Disruptive, Effective, Modern Cyber Protection

August 28, 2018 Added by:Boris Vaynberg

Companies need to look for a solution that strengthens their cyber defenses dramatically by preventing attacks before they enter and harm their organization, their customers and their brand.

Comments  (0)

21ebb461b9add7173e8e69f62ef440b4

When a Regulators’ Visit Can Be the Least of Your Worries

August 28, 2018 Added by:Jesse Canada

Companies today have a huge task on their hands with the sheer volume of red tape to demonstrate compliance.

Comments  (0)

23cdc45f8cc85a3009e56cf5bd89a095

Plug Your Cloud Cybersecurity Holes

July 26, 2018 Added by:Marie Hattar

Threat detection and analytics are only as effective as the granularity the network infrastructure provides for packet access.

Comments  (0)

0b8e9d7009308c174e700bcaf89c4474

Criminal Cyberattacks Are Up. Can Automated Security Help Bring Them Down?

July 26, 2018 Added by:James Lee

Companies that still rely on manual processes – security tools that require frequent tuning or manual CVE patching, for example – fare worse if they are breached.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Memory Protection beyond the Endpoint

July 16, 2018 Added by:Liviu Arsene

Re-engineering security solutions to fit the new infrastructure, performance, and scalability needs of organizations is crucial as advanced threats often exploit security blind spots.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Intent Based Networking: Turning Intentions into Reality

July 16, 2018 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder of AlgoSec, examines the potential of Intent-Based Networking and how it can improve network security.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Science Fiction Come True: Weaponized Technology Threatens to Shatter Security, Critical Systems

July 03, 2018 Added by:Steve Durbin

In the face of mounting global threats, organization must make methodical and extensive commitments to ensure that practical plans are in place to adapt to major changes in the near future.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Least Privilege Access – Still at the Front Lines of Security

June 27, 2018 Added by:Jackson Shaw

The principle of least privilege is a critical component to any effective privileged access management program, but it is not the only principle.

Comments  (0)

0a36f423b9a230eb25d9f024fb71c03c

Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI’s Siblings

June 13, 2018 Added by:Guy Caspi

To fully understand “machine learning” and “deep learning,” it’s worth taking a look at each subfield’s advantages and limitations.

Comments  (0)

4b07a2ec18add0e3dda7f96842143f05

The 3 Must Knows of Sandboxing

June 04, 2018 Added by:Boris Vaynberg

While sandboxes do provide a layer of prevention in a cyber threat prevention strategy, they come with a tax that may be too high for most organizations to pay.

Comments  (0)

Dfb05b2df86265de8900aa5aadd6d685

Infrastructure Under Attack

May 31, 2018 Added by:Tom Bienkowski

Any organization that delivers services over the web needs strong, purpose-built DDoS protection.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

How to Prevent Cloud Configuration Errors

May 29, 2018 Added by:Reuven Harrison

With unified visibility into the whole network, at all levels, IT managers will be able to strike a balance between security and functionality.

Comments  (0)

6a1fbf6a6315721b9e8931e69112c21e

SOC Automation: Good or Evil?

May 24, 2018 Added by:John Moran

The need for SOC automation is increasing in urgency since adversaries are also harnessing software and hardware to develop and carry out attacks.

Comments  (0)

041c3f1348bafada6586f01a609f51df

Can Organisations Turn Back Time after a Cyber-Attack?

May 23, 2018 Added by:Patrice Puichaud

With the costs of breaches escalating, it’s more important than ever to have the capability to learn from incidents to avoid history repeating itself.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »