For smaller security department, careful consideration of SIEM options can bring the relief and capabilities that everyone is looking for.
Business networks - from SMBs to large enterprises to education institutions and everyone in between - have never been more vulnerable.
A more remote and mobile workforce is helping companies to reduce costs and improve employee productivity and collaboration, but organizations are at risk of losing control of their data.
As mobile devices continue to infiltrate organizations, the demand for secure solutions becomes critical.
In today's diverse and sophisticated threat landscape, CISOs and IT departments face daunting information security challenges.
Vilfredo Pareto, the Italian scientist , would be rolling in his grave if he knew how data is treated in a typical data loss prevention (DLP) solution.
Amidst a rapidly shifting threat landscape that is fueled by a burgeoning cyber crime economy, many organizations are asking themselves "Are we already breached and just don't know it?"
Several factors are tipping the scales in favor of the bad guys. The top three are lack of (threat) information sharing, insufficient security automation and the absence of continuous security risk monitoring.
The need for cyber threat intelligence sharing is still vital, and with Congress sidelined, it's going to take leadership from the nation's corporate executives to make progress on this issue within the framework of our current laws.
While agility, availability and lower TCO will drive business to the cloud, organizations must address open questions around the security and compliance of PHI, PII, and who has access to it.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- IBM will invest $3 billion in new IoT unit
- Infostealer Laziok targets energy companies
- 30 percent of practitioners say they would pay cyber extortionists to retrieve their data
- The best defense is a good offense: The importance of securing your endpoints
- British Airways says rewards accounts hacked, locked down