Advertise

Advertise

NTT Security at RSA Conference 2018

SC Media’s Online Editor Doug Olenick sat down with Court Little from NTT Security at the RSA Conference 2018 to discuss the new science of cybersecurity. Take a look at this short video for some insight into NTT Security’s thoughts on the topic.   

Threat Territory

For any infosec professional, threats are as routine as Mondays. But just like everyone’s least favorite day of the week, there are some risks you’re not always ready for.   After a threat-filled RSAC 2017, technology writer and blogger Tony Kontzer is ready to help you up your threat savvy. A culmination of Kontzer’s Conference…

The GDPR: A rule to rule them all.

WannaCry. Petya. Security breaches are becoming bigger—and badder—forcing the security world to revamp their approach.   Once overseen by 50 individual laws, breach regulation as we know it will change with the arrival of the European Union General Data Protection Regulation (GDPR). Starting May 25, 2018, the GDPR’s strict new rules and sanctions will force…

Striking Security Gold: A Decade of Cybersecurity Insights

Insights are everywhere. But uncovering them can sometimes take more than a one-off glance.   After reading and analyzing nearly 15,000 RSA Conference Call for Paper submissions, Wade Baker hit an informational gold mine. Filled with telling data, Striking Security Gold lays out a critical 10-year timeline in cybersecurity. And addresses all angles of the…

GDPR Without the Hype: A No-Nonsense Guide for IT Security

The General Data Protection Regulation, or GDPR. It may be the new kid on the cybersecurity block, but that doesn’t mean it’s something you can ignore. Effective in May of 2018, the regulation marks a colossal shift in the treatment and handling of personal data. And while the GDPR is an EU policy, its effects…

Four bad archiving habits to break

You are an archivist. In fact, everyone throughout your organization is, from IT peers to knowledge workers to the C-suite. Hopefully, your archive isn’t an old, on-premises storage box. In today’s information-driven business world, it needs to be more than that. It needs to be a digital repository with multiple dimensions: It needs to safeguard…

The essentials to a modern cloud archive

As email-borne threats like ransomware, evolve, it’s more important than ever to have a separate and safe copy of your data. Your business needs to function; end-users need the ability to find what they need when they need it; and you need fast search and e-discovery capabilities to meet regulatory compliance and governance requirements –…

Identifying Tomorrow’s Threats

It’s one thing to put a security validation program in place. It’s another thing to ensure that your threat detection systems identify sources of potential breaches and their business impact and stop them before they take hold. Threat detection has been in the news following several major data breaches, like this summer’s WannaCry attack. But…

Keep Two Simple Principles in Mind to Improve Threat Detection

These days, nearly every security leader is seeking ways to improve her team’s threat detection capabilities. According to the RSA Threat Detection Effectiveness Survey, 75 percent of respondents are dissatisfied with their organizations’ ability to detect and investigate threats.  Security teams can pursue any number of strategies aimed at helping them detect threats faster, from…

Next post in Advertise