Identity as a threat plane was not discussed in Dictionary.com Word of the Year

Identity – Dictionary.com’s 2015 Word of the Year

Identity is the "2015 Word of the Year" based on Dictionary.com analysis of the most robust areas of language evolution and based on user interest ...

Machine Learning

Learning Some Machine Learning While Learning From It

Machine learning is ingrained in our day-to-day life. It is part of our spam filters mechanism, voice command smartphone interpretation and any search on Google. ...

Highlights from FS-ISAC (Fall 2015) San Diego, CA

Highlights from FS-ISAC (Fall 2015) San Diego, CA

If you missed out on FS-ISAC this week, below is an elevator ride summary of key security points. Sorry, unable to pass on the 80-degree ...

User Behavior Analytics

Where can I find more about User Behavior Analytics?

When I talk to friends and colleagues about user behavior analytics there are some people who know about this topic but many who don’t. After ...

User behavior and inside threat detection

Question: What is the most common cause for data breaches? Answer: Weak and stolen credentials. About 76% of network intrusions involved weak credentials, according to ...

The Benefits of an Insider Threat Detection Program

With the rapid increase in cyber-crime, it is imperative for businesses to invest more in security to protect vital organizational data and assets. While it ...

Do you think all healthcare insurers are safe?

New Hack, Same Old Story The news of the Anthem breach has hit every major media outlet in record time. The story line is the ...