News

CSO Online
05 Dec: 6 steps for GDPR compliance

Failure to comply will be costly. The General Data Protection Regulation (GDPR) is in the news these…

SC-Magazine-News-Logo
09 Nov: Women in Cybersecurity: Things are changing… slowly

Last September, I attended a conference on cybersecurity and innovation, and I was impressed by…

darkreading
26 Oct: Advanced Analytics + Frictionless Security: What CISOs Need to Know

Advances in analytics technologies promise to make identity management smarter and more transparent to users….

IT-Network-Logo
12 Oct: BT Bilgi Teknolojileri – Gurucul Announce Partnership for a New Approach to Data Security

  BT BİLGİ TEKNOLOJİLERİ-GURUCUL İŞBİRLİĞİ VERİ GÜVENLİĞİNE YENİ BİR BAKIŞ GETİRİYOR… Davranış bazlı güvenlik analitiği…

CSO Online
12 Sep: Using Identity to Protect the Mobile Perimeter

It’s the biggest threat surface and best enforcement point for enterprise security Leslie K. Lambert…

wsj
18 Jul: Aetna Adds Behavior-Based Security to Customer Application

App will monitor user behavior in real time; passwords optional Insurance giant Aetna Inc. is…

CSO Online
06 Jul: What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats. Leslie K. Lambert…

cioapplications
30 Jun: The Role Of Machine Learning In Predictive Security

Leslie K. Lambert cioapplications.com | June 30, 2017 “Machine learning is playing a transformative role in…

for the Record
21 Jun: Can Health Care Trust Its Security Practices?

What’s a day in health care without news of another data breach? The crimes run…

Share this page: