Database Security
Eight Steps to Migrate Your SIEM
July 22, 2019 Added by:Trevor Daughney
The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.
Comments (0)
Taking Advantage of Network Segmentation in 2019
January 16, 2019 Added by:Reuven Harrison
Here's how organizations can get started with network segmentation – including some potential issues to plan for and successfully avoid.
Comments (0)
2019, The Year Ahead in Cloud Security
January 02, 2019 Added by:Peter Martini
In 2019, cloud security will confound organizations as concerns over data privacy, and the security skills gap pervade. But the cloud will come to its rescue.
Comments (0)
Gartner SOAR Adoption Rate Prediction: From 1% to 15% by 2020 - Why Should You Care?
September 06, 2018 Added by:Rishi Bhargava
SOAR tools allow for an effective way of fighting security threats through a central collection of intelligence that can be quickly transformed into action.
Comments (0)
4 Ways Every Employee Can Play a Role in Their Company’s Security
March 23, 2018 Added by:Tomáš Honzák
Employees can help a company avoid catastrophic data breaches and protect their own personal data more effectively.
Comments (0)
Four Ways to Protect Your Backups from Ransomware Attacks
November 22, 2017 Added by:Rod Mathews
Backups are a last defense and control from having to pay ransom for encrypted data, but they need protection also.
Comments (0)
Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update
October 17, 2017 Added by:James E. Lee
In a pre-release statement, Oracle has revealed that the October Critical Patch Update (CPU) is likely to see nearly two dozen fixes to Java SE, the most common language used for web applications.
Comments (0)
How to Choose the Right Data Protection Strategy
August 02, 2017 Added by:Dave Packer
A deep dive on data protection solutions and how they fit unique needs.
Comments (0)
How to Prevent Ransomware and Cyberattacks
July 14, 2017 Added by:Steven Minsky
The impacts of ransomware and other breaches that exploit failures in risk management are preventable. An attack can come at any time, and failing to implement a strong prevention strategy is a recipe for disaster.
Comments (0)
How Does Samba Compare to WannaCry?
July 05, 2017 Added by:Rotem Iram
Many reports are drawing comparisons between the Samba vulnerability and WannaCry, but they don't pose the same widespread risk.
Comments (0)
What Is Your Security Canary?
April 13, 2017 Added by:Jesse McKenna
Although traditional anti-malware approaches tend to focus on looking deep within each endpoint for suspicious activity, in the case of ransomware particularly, this equates to monitoring the coal miners and when an event happens, you’ve just lost a miner.
Comments (0)
Why Is Digital Property Monitored Less than Physical Property?
March 09, 2017 Added by:Ajit Singh
If we were to place as much emphasis on monitoring events that take place on our IT systems as we do monitoring spending habits and shoplifting, many of the data breaches we hear about today could be largely mitigated.
Comments (0)
Exchanges in History: What Third Party Cyber Risk Management (TPRM) Programs Can Learn from the Past
March 09, 2017 Added by:Scott Schneider
Throughout history, whenever organizations, governments, or industries have used an exchange to share information, great transformation has taken place.
Comments (0)
5 Signs You Need to Upgrade Your Legacy IAM
December 02, 2016 Added by:James Litton
A modern identity and access management (IAM) solution is not a multi-year journey anymore.
Comments (0)
What It Will Really Take to Build Trust in Security Companies
September 28, 2016 Added by:Ori Eisen
If a company trusts their own product to not fail, the customer can too—with this level of trust ultimately reaching the average person. It’s a win-win-win.
Comments (0)
What the Auto Industry Can Learn from Payments Sector about Cybersecurity
August 17, 2016 Added by:Johannes Lintzen
An established Root of Trust, combined with industry standards like those adopted by the payments industry and ongoing dialogues among leaders in the field, will ensure the automotive industry stays ahead of security risks associated with connected vehicles.
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization