Most Recent Articles by Peter Stephenson
We combined DLP and endpoint security tools this year because, in the spirit of convergence, we are seeing the two groups come together as endpoint starts to include DLP more and more.
There is an increasing trend today toward focusing on such next-generation functionality as machine learning, Big Data analytics and behavioral analysis. This month's First Look does all of that very effectively.
The big challenge today with mobile device security, of course, continues to be BYOD.
Threat Hunter from Exabeam focuses on the user's behavior and builds a model.
This month we take up vulnerability management tools.
More Articles by Peter Stephenson
Most Recent Blog Posts
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- U.S. government extends offer to protect states from electoral cyberthreats
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought