More Than Just a Fad: Lessons Learned About Threat Hunting in 2018

One cybersecurity capability that continues to prove it’s here to stay is threat hunting, a proactive approach to discovering and mitigating threats.

The post More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 appeared first on Security Intelligence.

Continue reading More Than Just a Fad: Lessons Learned About Threat Hunting in 2018

Advancing Security Operations Through the Power of an SIEM Platform

Thanks to a wealth of new capabilities, security operations teams that leverage a cutting-edge SIEM platform are better armed to defend their organizations from advanced and insider threats.

The post Advancing Security Operations Through the Power of an SIEM Platform appeared first on Security Intelligence.

Continue reading Advancing Security Operations Through the Power of an SIEM Platform

How to Choose the Right Artificial Intelligence Solution for Your Security Problems

If you’re thinking about adopting artificial intelligence as an ally in your security operations center, the following questions and considerations can be helpful to guide your decision-making.

The post How to Choose the Right Artificial Intelligence Solution for Your Security Problems appeared first on Security Intelligence.

Continue reading How to Choose the Right Artificial Intelligence Solution for Your Security Problems

How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries

Using unique methods of analyzing DNS data, advanced DNS analytics enables security teams to quickly and proactively find and eliminate potential threats.

The post How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries appeared first on Security Intelligence.

Continue reading How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries

Don’t Overlook Your Data Blind Spots: 5 Tips for Protecting Unstructured Data

As data becomes more fluid, dynamic and distributed, so do the challenges around protecting it. Unlike traditional data stores, there is little to no control of unstructured data.

The post Don’t Overlook Your Data Blind Spots: 5 Tips for Protecting Unstructured Data appeared first on Security Intelligence.

Continue reading Don’t Overlook Your Data Blind Spots: 5 Tips for Protecting Unstructured Data

Understanding California’s Consumer Privacy Act: The ‘American GDPR’

Most companies still are not fully up to speed on GDPR compliance. Starting in 2020, they’ll have a whole new regulatory maze to navigate: California’s Consumer Privacy Act.

The post Understanding California’s Consumer Privacy Act: The ‘American GDPR’ appeared first on Security Intelligence.

Continue reading Understanding California’s Consumer Privacy Act: The ‘American GDPR’

How Will You Solve the Data Classification Conundrum?

Data classification takes on even greater importance today in the context of regulatory compliance mandates and debates over data privacy. Here’s what you need to know.

The post How Will You Solve the Data Classification Conundrum? appeared first on Security Intelligence.

Continue reading How Will You Solve the Data Classification Conundrum?

Need for Speed: Optimizing Data Masking Performance and Providing Secure Data for DevOps Users

Let’s start with a pretty common life experience — you identify a need (e.g., transportation), you evaluate your options (e.g., evaluate car manufacturers, various features, pricing, etc.), and you decide to purchase (e.g., vehicle X). This… Continue reading Need for Speed: Optimizing Data Masking Performance and Providing Secure Data for DevOps Users

Leveraging Imperva Solutions for GDPR Compliance Part II: Pseudonymization

Down to the wire- the GDPR compliance deadline is here. It’s May 25 and the EU’s General Data Protection Regulation (GDPR) is live. As you know by now, the risk and potential costs associated with a failure to comply with the EU’s Gen… Continue reading Leveraging Imperva Solutions for GDPR Compliance Part II: Pseudonymization

How to Transform Data Into Actionable Threat Intelligence

Threat intelligence should be translated into business-speak to help decision-makers understand the impact of potential threats and incorporate TI into their business strategies.

The post How to Transform Data Into Actionable Threat Intelligence appeared first on Security Intelligence.

Continue reading How to Transform Data Into Actionable Threat Intelligence