CISOs increasingly are summoned to present to their Boards of Directors. But too often these presentations fail to frame the right topics with the right metrics, says Jacob Olcott of BitSight. He offers advice for maximizing the opportunity in front of the Board.
Hybrid cloud adoption is accelerating within the financial services industry and few organizations have a solid understanding of how to secure hybrid cloud.
Most companies employ an array of cloud services from an array of providers, each with its own set of security controls, frameworks and products that increase...
The regulator and legislative fallout of the global financial crisis continues to place intense pressure on the financial industry.
Not only is the volume of regulations growing, so is their complexity a result of the diverse and inconsistent array of regional and jurisdictional mandates being imposed on financial...
As big-data analytics matures, it will play a bigger role, but security information and event management software, or SIEMs, will also remain essential, contends Gary Warner, director of research in computer forensics at the University of Alabama at Birmingham.
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells.
Download this eBook interview transcript with Laurence Pitt of Juniper Networks and learn about:
Data's true value in today's economy;
How organizations are exposing...
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells, says Laurence Pitt of Juniper Networks. He offers insights on leveraging and securing data.
For the internet of things to become a business enabler in India, security considerations must be adequately addressed. So regulators have mandated that organizations take appropriate security steps.
Traditional perimeter-centric data center security strategies are no longer effective against today's malicious and highly sophisticated attacks. While tremendous effort, resources, and technology are applied to securing the perimeter of the data center, until recently, nothing resembling that same level of thought...
Since its debut two years ago, Watson for Cyber Security is now being used by analysts to help their enterprises defend against attacks. Security operations centers are using it to address challenges around the skills gap, to relive pressure from analysts and to process unstructured data.
Download this whitepaper...
Applying data science to detect anomalous behaviour is playing a bigger role in securing enterprises, says Sumeet Mathur, vice president at CA Technologies.
How can a supercomputer help enterprise security teams respond to today's evolving threat landscape?
Download and read this transcript of Martin Borrett of IBM and Ronan Murphy of Smarttech discussing the promise and impact of Watson for Cyber Security at this year's Infosecurity Europe in London, and learn...
How can a supercomputer help enterprise security teams respond to today's evolving threat landscape? Martin Borrett of IBM and Ronan Murphy of Smarttech discuss the promise and impact of Watson for Cyber Security.
With so much of a typical IT infrastructure operating in a virtualized manner these days, IT organizations can experience a variety of challenges when protecting, recovering, and ensuring the availability of mission-critical platforms. Whenever IT modernizes any aspect of a specific production platform, it must also...
Big data and machine learning will play increasingly critical roles in improving information security, predicts Will Cappelli, a vice president of research at Gartner, who describes the reasons why.
IT environments continue to evolve beyond physical servers. Today, many important production resources operate on virtual machines (VMs) running on multiple hypervisors, and more organizations have been moving their mission-critical business processes offsite to the cloud. As a result, the requirements for protecting...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.