cso_online

6 steps for GDPR compliance

Failure to comply will be costly. Leslie K. Lambert www.csoonline.com | Dec 4, 2017 The General Data Protection Regulation (GDPR) is in the news these days — for good reason. ...

SC-Magazine-News-Logo

Women in Cybersecurity: Things are changing… slowly

Author Jane Melia VP of strategic business development QuintessenceLabs www.scmagazine.com | November 09, 2017 Last September, I attended a conference on cybersecurity and innovation, and ...

darkreading

Advanced Analytics + Frictionless Security: What CISOs Need to Know

Saryu Nayyar https://www.darkreading.com | October 26, 2017 Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is ...

IT-Network-Logo

BT Bilgi Teknolojileri – Gurucul Announce Partnership for a New Approach to Data Security

Saryu Nayyar http://www.itnetwork.com.tr| October 12, 2017 BT BİLGİ TEKNOLOJİLERİ-GURUCUL İŞBİRLİĞİ VERİ GÜVENLİĞİNE YENİ BİR BAKIŞ GETİRİYOR… Davranış bazlı güvenlik analitiği teknolojileri lideri Gurucul, Türkiye’nin önde gelen ...

cso_online

Using Identity to Protect the Mobile Perimeter

It’s the biggest threat surface and best enforcement point for enterprise security Leslie K. Lambert www.csoonline.com | Sep 12, 2017 Digital transformation projects are all about providing ...

wsj

Aetna Adds Behavior-Based Security to Customer Application

Steven Norton www.blogs.wsj.com | July 12, 2017 App will monitor user behavior in real time; passwords optional Insurance giant Aetna Inc. is rolling out a new security ...

cso_online

What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats. Leslie K. Lambert www.csoonline.com | July 6, 2017 Machine learning has emerged as the ideal ...

cioapplications

The Role Of Machine Learning In Predictive Security

Leslie K. Lambert cioapplications.com | June 30, 2017 “Machine learning is playing a transformative role in predictive security, enabling organizations to develop complex risk detection and ...

for the Record

CAN HEALTH CARE TRUST ITS SECURITY PRACTICES?

By Lee DeOrio (Lee DeOrio is editor of For The Record) June 21, 2017 What’s a day in health care without news of another data ...

infosecurity

Insider Threat Detection in a Borderless World

Saryu Nayyar www.infosecurity-magazine.com | June 14, 2017 The wide scale adoption of hybrid data center and cloud IT infrastructures is creating new security gaps, risks and ...