BBA-Blog1-Image-(800x400)

The Vanishing Security Perimeter

Ankur Chadda Product Marketing @Ankur_Chadda Feb 9, 2017 The security perimeter has faded. Old defenses for environments can no longer be relied upon to ensure ...

Blog-Join-Gurucul-at-RSA

Join Gurucul (#2407) at RSA in San Francisco this February

Craig D. Kensek Senior Product Marketing Manager Visit us at RSA Conference 2017, ‘Where the world talks security’.  RSA is one of the industry’s largest ...

Risky Science

Risky Science of Risk Assessment

Aruna Rajasekhar and Pete Gajria, Data Scientists Dec 8, 2016 Data is the currency of the digital age. It is the foundation for analytics. The ...

blog_thumb-nsa-contractor

NSA Contractor Suspected for Stealing Classified Data

Beau Hutto, VP Federal Oct 19, 2016 Harold Thomas Martin may have stolen NSA classified data five months after Edward Snowden left his contractor position ...

mission-critical

Mission Critical Security Risk Analytics Needs in Federal Agencies

Author Jason Ohs Director, Federal Systems Engineering Sep 28, 2016 There are marked differences in Federal and Commercial spaces. Some are characterized by organizational mandates, motivations ...

emrimg

Mandates drive EMR/EHR, now IAM needs Identity Analytics

Teri Takai Senior Advisor, Center for Digital Government Sept 1, 2016 I've seen a lot of security trends through the years, but this one caught my eye ...

gartner-catalyst

Gartner Catalyst San Diego Highlights

Tom Clare VP Marketing Aug 23, 2016 San Diego weather, great food, and spending time with leading architects and innovators made for a few good ...

Active Directory Cleaning

What is the CIO and CISO’s Worst Kept Secret?

Paul Wahlen Technical Director Aug 15, 2016 My colleagues and I have observed an issue which has plagued enterprises for some time now, and the longer ...