Data Protection
2011 Cost of Data Breach Study Shows Organizations Employing a CISO With Overall Responsibility for Enterprise Data Protection, Paid Less after a Breach, Saving...
Hi, what are you looking for?
Learn how attackers hide in plain sight—and what you can do to stop them without slowing down your business.
2011 Cost of Data Breach Study Shows Organizations Employing a CISO With Overall Responsibility for Enterprise Data Protection, Paid Less after a Breach, Saving...
If you’re being honest with yourself, major successful cyber attacks on companies in the past few years should convince you of the fact that...
I have a confession to make: Like many security professionals, I have a love-hate relationship with Governance, Risk Management and Regulatory Compliance (GRC).
Defending Against Insider Threats in SCADA Environments Using Context and Correlation[Read Previous Column: "SCADA Mischief Episode 1: A Picture is Worth a Thousand Worms"...
SAN FRANCISCO – RSA CONFERENCE 2012 – EMC today announced the availability of five new security and risk management advisory services designed to help...
SAN FRANCISCO - RSA Conference 2012 – Rapid7 and Modulo (known for GRC solutions) have teamed up to offer their respective platforms in one...
SAN FRANCISCO -- RSA CONFERENCE 2012 -- RSA, the Security Division of EMC, today introduced enhancements to its NetWitness Live™ platform, including expanded threat...
In addition to being a renowned theoretical physicist, Albert Einstein was also quite a wizard at writing security procedures and processes.
FishNet Security today launched a new cloud-based threat monitoring and response service aimed at helping businesses log information security events across multiple sources, reduce...
If you are part of a security team that spends time carefully piecing together and reviewing corporate IT security policies, this may hurt your...
Symantec today shared some details on Symantec Control Compliance Suite 11, the next generation of its enterprise-class IT governance, risk and compliance (GRC) solution....
VeriSign has admitted to falling victim to several attacks in 2010 that resulted in information being swiped from their servers.
New Solution Helps Enterprises Discover, Understand and Block Malware Utilizing Big Data AnalyticsSourcefire today introduced a new malware protection and analysis solution designed to...
An Endpoint Protection Best Practices survey from Symantec, which was conducted last October by Applied Research, shows that organizations following best practices for protecting...
There are some things that the best CIOs and IT managers can’t prevent entirely as they depend on other people. An example of this...
Software-as-a-Service (SaaS) security solutions vendor Qualys, today announced updates to its QualysGuard Web Application Scanning suite, including the ability to integrate with Selenium, the...
Executives need to be mindful that software non-compliance within their organization can result in serious financial risks for the company.
Operating with blinders on, whether you are riding a bike, running a business or operating a technology enterprise can be a recipe for serious...
Does your Security policy take the Carrier into Consideration? Does it Require Users to Change the Default PIN?
As Long as Attackers are Organized and We’re not, We’re Losing an Asymmetric War.