Consolidation is coming for the cybersecurity industry

It’s starting to happen. Amid a flurry of mergers and acquisitions, the cybersecurity industry is embarking on a path of consolidation that analysts predict will result in the existence of far fewer companies within just a few years. Thousands of cybersecurity vendors are in the marketplace, offering services ranging from anti-phishing and malicious software analysis to threat detection that relies on artificial intelligence technology. The number of companies will reduce by half within five to seven years, as many existing firms are acquired by larger players, and others simply go out of business, said Bill Crowell, a partner at the venture capital firm Alsop Louie Partners. “Cyber defense is about having an integrated set of tools that work together to prevent attacks,” said Crowell, a former deputy director of the U.S. National Security Agency. “But the industry now has a thousand points of light and no illumination. It’s as if […]

The post Consolidation is coming for the cybersecurity industry appeared first on Cyberscoop.

Continue reading Consolidation is coming for the cybersecurity industry

10/1/18: Dtex, Insider Threat, Privacy News: Welcome to Cybersecurity Awareness Month! CEO Christy Wyatt Reveals Trusted Insider Strategy, Provides How To for Insider Negligence; Five Years Post Snowden, NSA Insiders Still Removing Classified Data

Welcome to Cybersecurity Awareness Month. Every year the United States Department of Homeland Security (DHS) uses October to highlight awareness for the importance of cybersecurity. The collaborative effort between the public and private sector is desi… Continue reading 10/1/18: Dtex, Insider Threat, Privacy News: Welcome to Cybersecurity Awareness Month! CEO Christy Wyatt Reveals Trusted Insider Strategy, Provides How To for Insider Negligence; Five Years Post Snowden, NSA Insiders Still Removing Classified Data

IBM Named a Leader in ‘The Forrester Wave: Identity Management And Governance, Q3 2018’

In its latest report for identity management and governance, Forrester recognized IBM Security as a Leader.

The post IBM Named a Leader in ‘The Forrester Wave: Identity Management And Governance, Q3 2018’ appeared first on Security Intelligence.

Continue reading IBM Named a Leader in ‘The Forrester Wave: Identity Management And Governance, Q3 2018’

9/24/2018: Dtex, Insider Threat, Privacy News: CEO Christy Wyatt Tells Enterprise Times UK How to Handle Negligent Insider Threats, CNBC Reports Insider Bribery on Rise, Wyatt to Speak at Forrester Forum on new Trusted Insider Strategy

The insider threat is typically viewed as an action perpetrated by a malicious insider who is seeking retribution against an employer or engaged in a nefarious activity for profit. While these are certainly examples of how it often plays out, there is … Continue reading 9/24/2018: Dtex, Insider Threat, Privacy News: CEO Christy Wyatt Tells Enterprise Times UK How to Handle Negligent Insider Threats, CNBC Reports Insider Bribery on Rise, Wyatt to Speak at Forrester Forum on new Trusted Insider Strategy

Customer Focus Drives Leadership in SIEM, Security Analytics

We’ve seen many changes in the SIEM and security analytics space over the last decade, but throughout that time, IBM QRadar has consistently innovated and led the market in addressing new threats.

The post Customer Focus Drives Leadership in SIEM, Security Analytics appeared first on Security Intelligence.

Continue reading Customer Focus Drives Leadership in SIEM, Security Analytics

Epic Fails in Data Security, Solutions Edition: Failure to Quantify Your ROI

One of the most common epic fails in data security is the failure to quantify the ROI of the enterprise’s data protection solutions.

The post Epic Fails in Data Security, Solutions Edition: Failure to Quantify Your ROI appeared first on Security Intelligence.

Continue reading Epic Fails in Data Security, Solutions Edition: Failure to Quantify Your ROI

Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences

To avoid the disastrous consequences of a breach, security professionals must be able to effectively communicate critical data risk in a language business leaders can understand.

The post Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences appeared first on Security Intelligence.

Continue reading Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences

Top Three Reasons Why GDPR Can Be Good for Business

In addition to its obvious data privacy benefits, a commitment to GDPR readiness can help organizations promote collaboration across business units and improve enterprisewide security culture.

The post Top Three Reasons Why GDPR Can Be Good for Business appeared first on Security Intelligence.

Continue reading Top Three Reasons Why GDPR Can Be Good for Business

Cloud Database Migration Peer Insights [Report]

Not long ago, for security, compliance or other reasons, it was unthinkable for many regulated organizations to move sensitive data into the cloud. It’s striking how things have changed. Maybe it was inevitable that services like email were cloud… Continue reading Cloud Database Migration Peer Insights [Report]

IBM a Leader in ‘The Forrester Wave: Enterprise Mobility Management, Q4 2017’

For the third straight time, IBM was recognized as a leader in “The Forrester Wave: Enterprise Mobility Management, Q4 2017” for its MaaS360 offering.

The post IBM a Leader in ‘The Forrester Wave: Enterprise Mobility Management, Q4 2017’ appeared first on Security Intelligence.

Continue reading IBM a Leader in ‘The Forrester Wave: Enterprise Mobility Management, Q4 2017’