SIEM considerations for small security departments

For smaller security department, careful consideration of SIEM options can bring the relief and capabilities that everyone is looking for.

A NAC for eliminating blind spots in advanced attacks

A NAC for eliminating blind spots in advanced attacks

Business networks - from SMBs to large enterprises to education institutions and everyone in between - have never been more vulnerable.

File sharing and mobile productivity: How to limit risk

File sharing and mobile productivity: How to limit risk

A more remote and mobile workforce is helping companies to reduce costs and improve employee productivity and collaboration, but organizations are at risk of losing control of their data.

Securely adopting 2014's top mobility trends

Securely adopting 2014's top mobility trends

As mobile devices continue to infiltrate organizations, the demand for secure solutions becomes critical.

Surviving in an era of continuous compromise

Surviving in an era of continuous compromise

In today's diverse and sophisticated threat landscape, CISOs and IT departments face daunting information security challenges.

Everyone knows the 80-20 principle - except the data classification experts

Everyone knows the 80-20 principle - except the data classification experts

Vilfredo Pareto, the Italian scientist , would be rolling in his grave if he knew how data is treated in a typical data loss prevention (DLP) solution.

It's when, not if

It's when, not if

Amidst a rapidly shifting threat landscape that is fueled by a burgeoning cyber crime economy, many organizations are asking themselves "Are we already breached and just don't know it?"

Why hackers are outsmarting us

Why hackers are outsmarting us

Several factors are tipping the scales in favor of the bad guys. The top three are lack of (threat) information sharing, insufficient security automation and the absence of continuous security risk monitoring.

Closing the cyber security threat intelligence gap

Closing the cyber security threat intelligence gap

The need for cyber threat intelligence sharing is still vital, and with Congress sidelined, it's going to take leadership from the nation's corporate executives to make progress on this issue within the framework of our current laws.

Securing data in the cloud: Mandate for encryption and key management

Securing data in the cloud: Mandate for encryption and key management

While agility, availability and lower TCO will drive business to the cloud, organizations must address open questions around the security and compliance of PHI, PII, and who has access to it.

Sign up to our newsletters

POLL