Security intelligence is the act of gathering every available piece of information passing through an organization's network in order to better understand who's doing what with whom. This white paper discusses how security intelligence addresses these shortcomings and empowers organizations from Fortune Five...
What if there were a 10% likelihood that your annual revenue could take a 6% hit from a security breach? Unfortunately, this is exactly the reality faced by companies using a tool-based approach to security monitoring and analysis.
Leaders take a very different approach to security monitoring and analysis, an...
Our objective, as the industry's largest global media organization, is to bring you the most important bits from the conference, whether you attended the event or are experiencing the content now for the first time. Call this the Best of RSA Conference 2017.
With the current demonetization move and the emphasis on cashless transactions in India, the chances of cyber risk to the payments infrastructure are higher ever before. What then will be India's
stance going forward and how do business and practitioners need to respond to this risk? country like India and what are...
For anyone who's worried about the rise of quantum computers and the risk that they could be used to crack modern, public-key crypto systems, leading cryptographers at the RSA Conference 2017 delivered a clear message: For now, do nothing.
Increasing regulatory oversight is overwhelming smaller banks and credit unions, pushing them to continue to focus more on compliance than overall cybersecurity and resilience, says Sean Feeney, CEO of Defense Storm.
By applying analytics to user behavior, organizations can better prioritize the actual risks facing their business, thus helping cut through the sheer volume of security alerts they face daily, says Doug Copley, deputy CISO of Forcepoint.
This edition of the ISMG Security Report features updates from RSA Conference 2017 on emerging technologies, the forthcoming White House cybersecurity executive order and Microsoft's call for a "Digital Geneva Convention."
Hackers gained unauthorized access to information on the website of India's Ministry of Home Affairs on February 12, prompting authorities to temporarily block it. But is the government well-equipped to prevent other such attacks?
The best starting point for effectively safeguarding data and protecting against breaches is to clearly understand what kind of data an organization has, where it's located and the risks, says Jason Hart of Gemalto.
As RSA Conference 2017 winds down and Information Security Media Group's series of exclusive video interviews wrap up, editors Tracy Kitten and Tom Field share their key takeaways from perhaps the busiest day of the event.