darkreading

Advanced Analytics + Frictionless Security: What CISOs Need to Know

Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is neither straightforward nor easy. The digital ...

cso_online

Using Identity to Protect the Mobile Perimeter

It’s the biggest threat surface and best enforcement point for enterprise security Leslie K. Lambert www.csoonline.com | Sep 12, 2017 Digital transformation projects are all about providing ...

wsj

Aetna Adds Behavior-Based Security to Customer Application

App will monitor user behavior in real time; passwords optional Insurance giant Aetna Inc. is rolling out a new security measure to its mobile and ...

cso_online

What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats. Leslie K. Lambert www.csoonline.com | July 6, 2017 Machine learning has emerged as the ideal ...

cioapplications

The Role Of Machine Learning In Predictive Security

Leslie K. Lambert cioapplications.com | June 30, 2017 “Machine learning is playing a transformative role in predictive security, enabling organizations to develop complex risk detection and ...

for the Record

Can Health Care Trust Its Security Practices?

What’s a day in health care without news of another data breach? The crimes run the gamut from ransom­ware and medical identity theft to inadvertent ...

infosecurity

Insider Threat Detection in a Borderless World

Saryu Nayyar www.infosecurity-magazine.com | June 14, 2017 The wide scale adoption of hybrid data center and cloud IT infrastructures is creating new security gaps, risks and ...

darkreading

Why Compromised Identities Are IT’s Fault

Saryu Nayyar www.darkreading.com| June 8, 2017 The eternal battle between IT and security is the source of the problem. The compromise and misuse of identity credentials provides ...