See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

A risk-focused data management program can help companies identify and protect their prized assets from attackers aiming to steal, publish or destroy them.

The post See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management appeared first on Security Intelligence.

Continue reading See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management

From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation

To protect corporate data from insider threats, security teams should leverage cognitive-enabled UBA and IGI solutions to measure users’ risk scores.

The post From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation appeared first on Security Intelligence.

Continue reading From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation

The CISO’s Guide to Managing Insider Threats

To effectively manage and remediate insider threats, the CISO must establish a comprehensive approach to governance, data analysis and incident response.

The post The CISO’s Guide to Managing Insider Threats appeared first on Security Intelligence.

Continue reading The CISO’s Guide to Managing Insider Threats

Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting

Threat hunting enables security teams to improve incident response speed and accuracy. It also empowers them to remediate threats proactively.

The post Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting appeared first on Security Intelligence.

Continue reading Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting

Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase

According to IBM X-Force data, cybercriminals have been targeting industrial control systems in the energy and utilities sector at an increasing rate.

The post Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase appeared first on Security Intelligence.

Continue reading Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase

Forcepoint, emphasizing ‘human-centered’ security, buys RedOwl

Cybersecurity company Forcepoint, as part of its intensifying focus on what it calls “human first security,” is buying RedOwl, which specializes in using data analytics to measure and manage insider risk. Austin, Texas-based Forcepoint announced the acquisition Monday, saying RedOwl’s analytics platform would be on sale immediately and over time would be integrated into its full range of products. Executives declined to reveal the terms of the acquisition. “If the cybersecurity industry fails to put people at the center, it is certain to fall short in helping customers protect their most vital assets,” said Forcepoint CEO Matthew Moynahan, in a statement. “Forcepoint is absolutely committed to empowering customers with human-centric security systems,” and the Baltimore-based RedOwl “fits squarely into this promise,” he said. Cloud computing, mobile technology and rapid changes to infrastructure are making traditional perimeter cybersecurity “a fallacy,” explained Bharath Vasudevan, senior director for Forcepoint’s data and insider threat security business. “By focusing on how, when, where and why […]

The post Forcepoint, emphasizing ‘human-centered’ security, buys RedOwl appeared first on Cyberscoop.

Continue reading Forcepoint, emphasizing ‘human-centered’ security, buys RedOwl

Acute Care Center Notifies Patients of Medical Records Security Incident

An acute care center has begun notifying patients of a security incident that might have compromised their medical records. In the late spring of 2017, UC Health first learned about a security event affecting the Daniel Drake Center for Post-Acute Care (DDC), one of its health system members. Between 29 July 2015 and 2 June […]… Read More

The post Acute Care Center Notifies Patients of Medical Records Security Incident appeared first on The State of Security.

Continue reading Acute Care Center Notifies Patients of Medical Records Security Incident

Seeing Data Security Breaches With Your Own Eyes

The new Data Insight feature for IBM Security Guardium enables analysts to more effectively monitor database access during security breaches.

The post Seeing Data Security Breaches With Your Own Eyes appeared first on Security Intelligence.

Continue reading Seeing Data Security Breaches With Your Own Eyes

4 Overlooked Insider Cybersecurity Threats That Could Lead to a Data Breach

By Jason Scheidemantel, Marketing Intern In an environment where nearly 8.4 billion devices are connected to the internet, it’s not unusual to question the security of your personal identifiable information (PII). Cyber threats from hackers exploit vulnerabilities in security and cost businesses around the world billions of USD every year. If asked to picture a […]

The post 4 Overlooked Insider Cybersecurity Threats That Could Lead to a Data Breach appeared first on Semafone.

Continue reading 4 Overlooked Insider Cybersecurity Threats That Could Lead to a Data Breach