cso_online

6 steps for GDPR compliance

Failure to comply will be costly. Leslie K. Lambert www.csoonline.com | Dec 4, 2017 The General Data Protection Regulation (GDPR) is in the news these days — for good reason. ...

IT-Network-Logo

BT Bilgi Teknolojileri – Gurucul Announce Partnership for a New Approach to Data Security

Saryu Nayyar http://www.itnetwork.com.tr| October 12, 2017 BT BİLGİ TEKNOLOJİLERİ-GURUCUL İŞBİRLİĞİ VERİ GÜVENLİĞİNE YENİ BİR BAKIŞ GETİRİYOR… Davranış bazlı güvenlik analitiği teknolojileri lideri Gurucul, Türkiye’nin önde gelen ...

cso_online

Using Identity to Protect the Mobile Perimeter

It’s the biggest threat surface and best enforcement point for enterprise security Leslie K. Lambert www.csoonline.com | Sep 12, 2017 Digital transformation projects are all about providing ...

cso_online

What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats. Leslie K. Lambert www.csoonline.com | July 6, 2017 Machine learning has emerged as the ideal ...

cioapplications

The Role Of Machine Learning In Predictive Security

Leslie K. Lambert cioapplications.com | June 30, 2017 “Machine learning is playing a transformative role in predictive security, enabling organizations to develop complex risk detection and ...

infosecurity

Insider Threat Detection in a Borderless World

Saryu Nayyar www.infosecurity-magazine.com | June 14, 2017 The wide scale adoption of hybrid data center and cloud IT infrastructures is creating new security gaps, risks and ...