The Five Attributes Needed to Succeed at DevSecOps

It’s hard to believe but the conversation around how security fits in DevOps has been going on for years. It was in 2012 when Gartner analyst Neil MacDonald wrote his blog DevOps Needs to Become DevOpsSec. In this blog MacDonald wrote &#8220… Continue reading The Five Attributes Needed to Succeed at DevSecOps

Integrate Your Ticketing System into Database Security to Prevent DBA Privilege Abuse

Many of the recent high-profile data security breaches were made by trusted insiders. They are often database administrators (DBAs) who are highly privileged and trusted insiders with access to sensitive data. In this blog post, I will discuss the inhe… Continue reading Integrate Your Ticketing System into Database Security to Prevent DBA Privilege Abuse

Employee training a security priority for financial CISOs in 2018, study says

In the past two years, cyberattacks on the financial sector have picked up speed. As companies in the sector struggle with the major shift toward digital transformation, some are caught off guard by the significant rise of malware designed specifi… Continue reading Employee training a security priority for financial CISOs in 2018, study says

GDPR and Breach Detection: How to Ask the Right Questions to Meet the GDPR Breach Notification Rule

It is now less than four months before the General Data Protection Regulation (GDPR) becomes effective. This new data regulation of the European Union is designed to provide individuals with rights and protections over their personal data collected by … Continue reading GDPR and Breach Detection: How to Ask the Right Questions to Meet the GDPR Breach Notification Rule

Using Machine Learning to Make Faster, Smarter Decisions About Insider Threats

Security professionals need a comprehensive way to analyze user behavior, automatically respond to reports of suspicious activity and manage user access accordingly to thwart insider threats.

The post Using Machine Learning to Make Faster, Smarter Decisions About Insider Threats appeared first on Security Intelligence.

Continue reading Using Machine Learning to Make Faster, Smarter Decisions About Insider Threats

How Management Can Help Prevent Insider-Caused Data Breaches

In 2017, some of the world’s most devastating cyber attacks were seen. Insider threats continue to be the primary reason for such high profile data breaches year over year. With the rise of malware as a service, insiders are now more than capable… Continue reading How Management Can Help Prevent Insider-Caused Data Breaches

How Management Can Help Prevent Insider-Caused Data Breaches

In 2017, some of the world’s most devastating cyber attacks were seen. Insider threats continue to be the primary reason for such high profile data breaches year over year. With the rise of malware as a service, insiders are now more than capable… Continue reading How Management Can Help Prevent Insider-Caused Data Breaches

The Enterprise Imperative: Five Tips for Improving Incident Response

According to IBM’s Christopher Scott, who spoke at The Wall Street Journal’s Pro Cybersecurity Executive Forum, the road to better incident response is “a marathon, not a sprint.”

The post The Enterprise Imperative: Five Tips for Improving Incident Response appeared first on Security Intelligence.

Continue reading The Enterprise Imperative: Five Tips for Improving Incident Response

Top Five Trends IT Security Pros Need to Think About Going into 2018

It’s that time of the year when we look back at the tech trends of 2017 to provide us with a hint of things to come. Accordingly, let’s engage in our favorite end-of-year pastime: predictions about the coming year. Equipped with Imperva&#82… Continue reading Top Five Trends IT Security Pros Need to Think About Going into 2018

Top Five Trends IT Security Pros Need to Think About Going into 2018

It’s that time of the year when we look back at the tech trends of 2017 to provide us with a hint of things to come. Accordingly, let’s engage in our favorite end-of-year pastime: predictions about the coming year. Equipped with Imperva&#82… Continue reading Top Five Trends IT Security Pros Need to Think About Going into 2018