wsj

Aetna Adds Behavior-Based Security to Customer Application

Steven Norton www.blogs.wsj.com | July 12, 2017 App will monitor user behavior in real time; passwords optional Insurance giant Aetna Inc. is rolling out a new security ...

cso_online

What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats. Leslie K. Lambert www.csoonline.com | July 6, 2017 Machine learning has emerged as the ideal ...

cioapplications

The Role Of Machine Learning In Predictive Security

Leslie K. Lambert cioapplications.com | June 30, 2017 “Machine learning is playing a transformative role in predictive security, enabling organizations to develop complex risk detection and ...

for the Record

CAN HEALTH CARE TRUST ITS SECURITY PRACTICES?

By Lee DeOrio (Lee DeOrio is editor of For The Record) June 21, 2017 What’s a day in health care without news of another data ...

infosecurity

Insider Threat Detection in a Borderless World

Saryu Nayyar www.infosecurity-magazine.com | June 14, 2017 The wide scale adoption of hybrid data center and cloud IT infrastructures is creating new security gaps, risks and ...

darkreading

Why Compromised Identities Are IT’s Fault

Saryu Nayyar www.darkreading.com| June 8, 2017 The eternal battle between IT and security is the source of the problem. The compromise and misuse of identity credentials provides ...

cso_online

You can steal my identity, but not my behavior

Time is ripe for transition from identity to behavior based security model Leslie K. Lambert CSO | Apr 21, 2017 The compromise and misuse of identity is ...

FCW

The Identity Threat

Teri Takai www.fcw.com| Mar 21, 2017 Identity has always played in a central role in IT. Yet it is not often associated with security. That's probably ...

darkreading

Why Identity Has Become A Top Concern For CSOs

Saryu Nayyar www.darkreading.com| Feb 21, 2017 Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the ...