Enterprise Security

D2dfc0582d6b23f510801d8a95d54c7c

Eight Steps to Migrate Your SIEM

July 22, 2019 Added by:Trevor Daughney

The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.

Comments  (0)

2bbe09d8431465f396a98305e7a1c5a6

What Call Center Fraud Can Teach Us about Insider Threats

July 22, 2019 Added by:Saryu Nayyar

Detecting and preventing call center fraud embodies many of the same challenges associated with fighting insider threats.

Comments  (0)

9fa920b7e1a16185ac7565a871901719

Best Practices for Remote Workers’ Endpoint Security

July 22, 2019 Added by:Mathivanan Venkatachalam

One of an IT admin’s most important jobs is to secure that data while it’s stored on and accessed by corporate and personal endpoints.

Comments  (0)

7b6799b0baa4ae08467bb98e99a89ae4

Beyond the Endpoint: Fighting Advanced Threats with Network Traffic Analytics

July 19, 2019 Added by:Filip Truta

Safeguarding enterprise assets is no longer just about protecting endpoints from malware, spam and phishing.

Comments  (0)

8864b99db2b2651e51dbd14fde0e361e

Today’s Top Public Cloud Security Threats …And How to Thwart Them

June 21, 2019 Added by:Michael Koyfman

In order to thwart exposure, companies must have the capability to look at all cloud environments and perform assessments of how such resources are secured.

Comments  (0)

5864aed0a807a1e29050f9221c6cfa67

Spring Cleaning: Why Companies Must Spring Clean Out Their Social Media Accounts This Season

June 14, 2019 Added by:David Stuart

Tips for cleaning and securing your online data this spring.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Building Modern Security Awareness with Experiences

June 14, 2019 Added by:Perry Carpenter

Think about your own organization’s culture and then find ways to create immersive, engaging experiences that will resonate with your people.

Comments  (0)

14a18daeba459ca50c5e7bcdde3a5fa0

The Promise and Perils of Artificial Intelligence

June 14, 2019 Added by:Boris Cipot

AI will help us to improve our lives. We, in turn, must ensure that the software doing so is secure.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Utilising the Benefits of Industrial Robots Securely

June 05, 2019 Added by:Jalal Bouhdada

The benefits of industrial robots won’t be achieved for long if they are not deployed with cybersecurity at their core.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

On the Horizon: Parasitic Malware Will Feast on Critical Infrastructure

June 04, 2019 Added by:Steve Durbin

Unprepared organizations will have a wide (and often unmonitored) attack surface that can be targeted by parasitic malware.

Comments  (0)

404b3b611dd8d2186d07c3a74d2fb4da

SOAR: Doing More with Less

April 26, 2019 Added by:Michele Zambelli

Implementing an SOAR model can provide the glue to make this security intelligence actionable using repeatable processes for faster incident response that does not require adding more resources.

Comments  (0)

408ac1e5b2b05b63e650bd356018b62c

Gaining Control of Security and Privacy to Protect IoT Data

April 24, 2019 Added by:Mike Nelson

It’s a matter of who is in control of our data. Today, IoT device manufacturers and businesses are in control. In the future, we must be in control of our own information.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Growing Reliance on Digital Connectivity Amplifies Existing Risks, Creates New Ones

April 24, 2019 Added by:Steve Durbin

Major threats to information security emerging over the next two years could impact businesses operating in cyberspace at break-neck speeds.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

How Microsegmentation Helps to Keep Your Network Security Watertight

April 24, 2019 Added by:Avishai Wool

Building and implementing a micro-segmentation strategy requires careful planning and orchestration to ensure it is effective.

Comments  (0)

6fe4d99c3f5787c7098e67eb3c9161fd

Through the Executive Lens: Prioritizing Application Security Vulnerabilities

March 28, 2019 Added by:Neal Goldman

By focusing on specific AppSec initiatives and applying well-tested strategies and tools, you can prioritize the most important issues to focus on.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Next Generation Firewalls are Old News in the Cloud

March 27, 2019 Added by:Sanjay Kalra

As users start to change the way they deploy infrastructure to the cloud, they will also need to find security solutions that are built by using the cloud in order to secure the cloud.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »