May’s Cybersecurity Recap: Welcome to the GDPR Compliance Show

Meeting the European Union’s GDPR compliance has been a source of continuing difficulty and discussion for businesses.

The post May’s Cybersecurity Recap: Welcome to the GDPR Compliance Show appeared first on Security Intelligence.

Continue reading May’s Cybersecurity Recap: Welcome to the GDPR Compliance Show

Data Center and Attack Surface Visibility Top Concerns in Cloud Computing, Study Finds

A few years ago, companies were reluctant to adopt cloud computing because they thought a lack of physical access to the network would deprive them of control over their data. A major shift occurred when they understood that, with suitable configu… Continue reading Data Center and Attack Surface Visibility Top Concerns in Cloud Computing, Study Finds

Five Ways Imperva Attack Analytics Helps You Cut Through the Event Noise

The maddening volume of events security teams have to deal with each day is growing at an exponential pace, making it increasingly difficult to effectively analyze and process credible threats. As more organizations move to cloud-based solutions, … Continue reading Five Ways Imperva Attack Analytics Helps You Cut Through the Event Noise

Healthcare IT Leaders Most Concerned about Ransomware and Insider Threats: Survey

Just over a year ago, the WannaCry ransomware attack wreaked havoc on the UK National Health Service (NHS), ultimately disrupting a third of its facilities and causing a rash of canceled appointments and operations. Breaches are always a concern in hea… Continue reading Healthcare IT Leaders Most Concerned about Ransomware and Insider Threats: Survey

What Is Next-Generation Privileged Account Management?

Organizations need a privileged account management (PAM) solution that integrates seamlessly with the existing security environment — and helps security teams enforce least privilege policies.

The post What Is Next-Generation Privileged Account Management? appeared first on Security Intelligence.

Continue reading What Is Next-Generation Privileged Account Management?

Breaking Bad Behavior: Can AI Combat Insider Threats?

Artificial intelligence (AI) tools enable security teams to identify behavioral patterns that could point to insider threats more quickly.

The post Breaking Bad Behavior: Can AI Combat Insider Threats? appeared first on Security Intelligence.

Continue reading Breaking Bad Behavior: Can AI Combat Insider Threats?

Insider Threats Remain #1 Security Headache for Organizations, Research Shows

Businesses cannot come up with a mitigation strategy to efficiently detect, identify and manage insider threats, according to research from the Ponemon Institute, so they risk the loss of critical confidential data and resources, network shutdown … Continue reading Insider Threats Remain #1 Security Headache for Organizations, Research Shows

As Cyber Risk Escalates, the C-Suite Must Take Action

As long as C-suite executives believe that cybersecurity is an IT issue, they will remain disengaged from the solutions and their role in supporting a robust cyber risk management strategy.

The post As Cyber Risk Escalates, the C-Suite Must Take Action appeared first on Security Intelligence.

Continue reading As Cyber Risk Escalates, the C-Suite Must Take Action

How to Tune Your Database Security to Protect Big Data

Data security for big data faces the same threats of external breaches, malicious insiders, and compromised insiders. So how do we take the trusted, successful data security methods used on RDBMS, and render them compatible with big data servers? How c… Continue reading How to Tune Your Database Security to Protect Big Data