SC-Magazine-News-Logo

Tesla saboteur trains spotlight on insider threats

Tesla's recent revelation that an employee turned saboteur messed with code and exfiltrated data underscores the continuing challenge and complexity of insider threats and the ...

cso_online

The time for network behavior analytics has come

Once considered the eminent domain of networking teams, network telemetry data is becoming a requirement to provide security analytics with a more complete view of ...

ITSP Logo

It’s A Hybrid World After All. How Do We Secure It?

Author: Nilesh Dherange, CTO, Gurucul    June 8, 2018 In the new, hybrid world of IT — often described as borderless — traditional approaches to ...

cso_online

Cross-channel fraud detection

How performing behavioral analysis across silos can help detect sophisticated attacks. Leslie K. Lambert www.csoonline.com | Apr 13, 2018 Cyber fraud costs organizations billions of dollars each ...

cso_online

6 steps for GDPR compliance

Failure to comply will be costly. The General Data Protection Regulation (GDPR) is in the news these days — for good reason. This sweeping new law applies ...

SC-Magazine-News-Logo

Women in Cybersecurity: Things are changing… slowly

Last September, I attended a conference on cybersecurity and innovation, and I was impressed by the unusually strong energy and vibe in the room. For ...

darkreading

Advanced Analytics + Frictionless Security: What CISOs Need to Know

Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is neither straightforward nor easy. The digital ...

cso_online

Using Identity to Protect the Mobile Perimeter

It’s the biggest threat surface and best enforcement point for enterprise security Leslie K. Lambert www.csoonline.com | Sep 12, 2017 Digital transformation projects are all about providing ...