IT-Network-Logo

BT Bilgi Teknolojileri – Gurucul Announce Partnership for a New Approach to Data Security

Saryu Nayyar http://www.itnetwork.com.tr| October 12, 2017 BT BİLGİ TEKNOLOJİLERİ-GURUCUL İŞBİRLİĞİ VERİ GÜVENLİĞİNE YENİ BİR BAKIŞ GETİRİYOR… Davranış bazlı güvenlik analitiği teknolojileri lideri Gurucul, Türkiye’nin önde gelen ...

cso_online

Using Identity to Protect the Mobile Perimeter

It’s the biggest threat surface and best enforcement point for enterprise security Leslie K. Lambert www.csoonline.com | Sep 12, 2017 Digital transformation projects are all about providing ...

cso_online

What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats. Leslie K. Lambert www.csoonline.com | July 6, 2017 Machine learning has emerged as the ideal ...

cioapplications

The Role Of Machine Learning In Predictive Security

Leslie K. Lambert cioapplications.com | June 30, 2017 “Machine learning is playing a transformative role in predictive security, enabling organizations to develop complex risk detection and ...

infosecurity

Insider Threat Detection in a Borderless World

Saryu Nayyar www.infosecurity-magazine.com | June 14, 2017 The wide scale adoption of hybrid data center and cloud IT infrastructures is creating new security gaps, risks and ...

darkreading

Why Compromised Identities Are IT’s Fault

Saryu Nayyar www.darkreading.com| June 8, 2017 The eternal battle between IT and security is the source of the problem. The compromise and misuse of identity credentials provides ...