Secure any kind of data, wherever it goes

We’ve all experienced that moment when you realize that you’ve shared the wrong file with the wrong person, potentially even at the wrong time. You’ve lost control over something valuable. In this podcast recorded at RSA Conference 2016, Grant Shirk and Veliz Perez, Head of Product Marketing and Product Marketing Manager at Vera respectively, talk about how the industry has been very focused on protecting data within the enterprise and on managed devices. But because … More Continue reading Secure any kind of data, wherever it goes

Why SMBs need threat intelligence

Most of the innovative work being done in information security comes from to small to medium sized companies. At the same time, there’s a lack of security solutions for other companies of the same size operating in other spaces. With limited personnel and financial resources, smaller businesses can find it challenging to obtain and manage cyber security solutions. In this podcast recorded at RSA Conference 2016, Mark Seward, VP of Product Marketing at Anomali, says … More Continue reading Why SMBs need threat intelligence

Linux security isn’t enough to stop data breaches

There is a difference between the security of an operating system and the security of the data created, which is edited and manipulated by people and saved on the operating system. Human error and insider threats are some of the top causes for data loss, which can and do still occur even in a “secure” environment. Add to this the most recently discovered Linux vulnerabilities, and it becomes clear that organizations need to take a … More Continue reading Linux security isn’t enough to stop data breaches

Container security for enterprise computing

The largest pain-point today for organizations moving to a container strategy is that containers are being adopted and managed by developers. Operations and security do not have the level of visibility and control that they are accustomed to. At the same time, for DevOps to succeed, security and operations controls must be as agile and move as quickly as the assets to be protected. In this podcast recorded at RSA Conference 2016, John Morello, CTO … More Continue reading Container security for enterprise computing

Web application security with Acunetix

Securing the web applications of today’s businesses is perhaps the most overlooked aspect of securing the enterprise. Web application hacking is on the rise with as many as 75% of cyber attacks done at web application level or via the web. Most corporations have secured their data at the network level, but have overlooked the crucial step of checking whether their web applications are vulnerable to attack. In this podcast recorded at RSA Conference 2016, … More Continue reading Web application security with Acunetix

Evolution of the enterprise managed security services market

In this podcast recorded at RSA Conference 2016, Court Little, Director of Product Management at Solutionary, talks about how the enterprise managed security services market in the last year has taken some interesting turns. Tune in to get a real-world… Continue reading Evolution of the enterprise managed security services market

Enhance your security ecosystem with TITUS Illuminate

The amount of data being created, shared and stored is growing exponentially. With more people accessing and storing files in a multitude of network and cloud repositories, your sensitive data could be just about anywhere. How do you protect it? In this podcast recorded at RSA Conference 2016, Stephane Charbonneau, CTO at TITUS, talks about TITUS Illuminate, which enhances your security ecosystem with data identification and classification. TITUS Illuminate scans file storage directories, including on … More Continue reading Enhance your security ecosystem with TITUS Illuminate

Insider threat protection with the DB Networks DBN-6300

Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent “insider threats” requires a new approach. Those who were once considered trustworthy may have lost their credentials to an attacker and are now posing an insider threat. This is why identifying compromised credentials in real-time has proven elusive until now. The situation has changed, and so must the mechanisms to mitigate the risk. In this podcast recorded at … More Continue reading Insider threat protection with the DB Networks DBN-6300

Customer Authentication: Multi-factor security from iovation

With most transactions now happening online, providing customers with a frictionless online experience that’s also highly secure is critical for today’s businesses. Still, most companies continue to rely heavily on usernames and passwords as their only means for authenticating customers. This creates a significant problem. Not only are passwords difficult for customers to recall and manage, but they can be easily stolen by fraudsters and resold on the black market. In this podcast recorded at … More Continue reading Customer Authentication: Multi-factor security from iovation

The power to immediately counter data theft with Matchlight from Terbium Labs

In June 2015, Terbium Labs launched Matchlight, a first-of-its-kind data intelligence system used to find stolen enterprise data on the dark web within minutes of it appearing. In this podcast recorded at RSA Conference 2016, Danny Rogers and Tyler Carbone, Chief Executive Officer and Chief Operations Officer of Terbium Labs respectively, talk about Matchlight in detail. Matchlight is built upon a massive dark web search engine, scanning the all corners of the internet for stolen … More Continue reading The power to immediately counter data theft with Matchlight from Terbium Labs