Advertise

Advertise

The GDPR: A rule to rule them all.

WannaCry. Petya. Security breaches are becoming bigger—and badder—forcing the security world to revamp their approach.   Once overseen by 50 individual laws, breach regulation as we know it will change with the arrival of the European Union General Data Protection Regulation (GDPR). Starting May 25, 2018, the GDPR’s strict new rules and sanctions will force…

Striking Security Gold: A Decade of Cybersecurity Insights

Insights are everywhere. But uncovering them can sometimes take more than a one-off glance.   After reading and analyzing nearly 15,000 RSA Conference Call for Paper submissions, Wade Baker hit an informational gold mine. Filled with telling data, Striking Security Gold lays out a critical 10-year timeline in cybersecurity. And addresses all angles of the…

GDPR Without the Hype: A No-Nonsense Guide for IT Security

The General Data Protection Regulation, or GDPR. It may be the new kid on the cybersecurity block, but that doesn’t mean it’s something you can ignore. Effective in May of 2018, the regulation marks a colossal shift in the treatment and handling of personal data. And while the GDPR is an EU policy, its effects…

Four bad archiving habits to break

You are an archivist. In fact, everyone throughout your organization is, from IT peers to knowledge workers to the C-suite. Hopefully, your archive isn’t an old, on-premises storage box. In today’s information-driven business world, it needs to be more than that. It needs to be a digital repository with multiple dimensions: It needs to safeguard…

The essentials to a modern cloud archive

As email-borne threats like ransomware, evolve, it’s more important than ever to have a separate and safe copy of your data. Your business needs to function; end-users need the ability to find what they need when they need it; and you need fast search and e-discovery capabilities to meet regulatory compliance and governance requirements –…

Identifying Tomorrow’s Threats

It’s one thing to put a security validation program in place. It’s another thing to ensure that your threat detection systems identify sources of potential breaches and their business impact and stop them before they take hold. Threat detection has been in the news following several major data breaches, like this summer’s WannaCry attack. But…

Keep Two Simple Principles in Mind to Improve Threat Detection

These days, nearly every security leader is seeking ways to improve her team’s threat detection capabilities. According to the RSA Threat Detection Effectiveness Survey, 75 percent of respondents are dissatisfied with their organizations’ ability to detect and investigate threats.  Security teams can pursue any number of strategies aimed at helping them detect threats faster, from…

A new level of preparedness

Operating and securing a business in the cloud can be hard. The rapid evolution of cyberthreats, inevitability of technical failure, and potential for human error are risk factors that organizations simply can’t ignore. These risk factors can cause irreparable damage like business disruption, lengthy downtime and data loss. Plus, the complexity and cost involved with…

Build a cyber-resilience plan for email

Going from vulnerable to cyber resilient against email-borne threats doesn’t have to be time-consuming, expensive or painful. Step one is making cyber resilience planning a priority; it should be part of your organization’s foundation and business strategy. Next, have a firm understanding of your needs, strengths and weaknesses. Finally, consider every aspect of your business…

Build It or Buy It? Know Your Options for Threat Detection & Response Solutions

We are sometimes asked to compare RSA threat detection and response solutions to those custom-assembled by security experts using various open-source products. With so many quality point solutions available, it’s natural to consider whether a combination of best-of-breed open-source solutions is better for a particular organization than an integrated commercial solution. RSA is a big…

Next post in Advertise