NTT Security: Delivering cyber resilience

In this podcast recorded at RSA Conference 2017, Garry Sidaway, SVP of Security Strategy & Alliances for NTT Security, talks about the formation of NTT Security and how they deliver cyber resilience by enabling organizations to build high-performing and effective security. Here’s a transcript of the podcast for your convenience. On the 1st of August, 2016, we formed NTT Security, with a focus on information security and risk management; and restructuring, really, to provide the … More Continue reading NTT Security: Delivering cyber resilience

How to leverage intelligent deception to detect cyber attacks

Perimeters are fading, and attackers find it easier and easier to penetrate organizational networks. Organizational networks today are chaotic, they’re very dynamic, and this is a fertile ground for the attackers to blend in and take action. In this podcast recorded at RSA Conference 2017, Yoel Knoll, VP of Marketing for TopSpin Security, talks about how you can leverage intelligent deception in order to detect cyber attacks. TopSpin Security provides customers with a rapid post-breach … More Continue reading How to leverage intelligent deception to detect cyber attacks

The dangers that come with buying pre-owned IoT devices

When you buy a second-hand connected car, can you be sure that it is not still not reachable by its former owner? Similarly, when you sell your own connected car, how can you be sure that it will not leak the personal information you fed it to the next owner? What could go wrong? Charles Henderson, Global Head of IBM’s X-Force Red, told the RSA Conference 2017 crowd about his own experience when selling a … More Continue reading The dangers that come with buying pre-owned IoT devices

AI SaaS application for cyber attack detection

PatternEx announced the first Artificial Intelligence SaaS application for cyber attack detection at RSA Conference 2017. PatternEx’s flagship product, the PatternEx Threat Prediction Platform, is available as a SaaS application with a free trial period to selected customers. Searching for IoC’s with a SIEM is a time consuming exercise that generates too many false positives to be effective. An Artificial Intelligence solution by contrast rolls up many log lines into a single behavior, then analyzes … More Continue reading AI SaaS application for cyber attack detection

Half of IT pros lack confidence in their company’s cybersecurity strategies

Centrify asked IT professionals attending RSA Conference 2017 how their companies secure applications and infrastructure in the age of access, and their responses revealed that a startling number lacked confidence in their own organization’s corporate security. Only slightly more than half (55%) stated they believe their company’s current technology investment ensures their company’s cybersecurity. But when asked about which of the 15 different identity and access management (IAM) best practices they use, it turns out … More Continue reading Half of IT pros lack confidence in their company’s cybersecurity strategies

Global geopolitical changes driving encryption adoption

Recent global geopolitical changes have made more people and organizations than ever worry about the privacy of their data, and consider increasing their use of encryption to ensure their data is kept safe. According to the results of a survey of 918 security professionals attending the 2017 RSA Conference: Almost three-fourths (72 percent) of security professionals say they are more concerned about data privacy; similarly, 71 percent say organizations are more concerned about data privacy. … More Continue reading Global geopolitical changes driving encryption adoption

Products highlighted by recent infosec awards

Bitglass was named by Cyber Defense Magazine the winner of the Hot Company award in the Cloud Security Solutions category. Bitglass is a Cloud Access Security Broker that enables enterprises to secure any SaaS, IaaS, or custom cloud application, as their sensitive data moves beyond the network perimeter. Its data protection suite provides end-to-end security and visibility over corporate data in the cloud and on any device, and enables IT to enforce access controls, limit … More Continue reading Products highlighted by recent infosec awards