Results for Cybersecurity

Deloitte: For CyberSecurity – Offense Can Be the Best Defense

As 2016 begins, organizations are going on the offense to combat cyber threats, according to a report this month by Deloitte LLP.  Companies and government agencies are no longer satisfied with simply "locking the doors" where cybersecurity is concerned, said the 2016 Deloitte Analytics Trends report.

Full Story >

Survey: Finance Execs Asked To Play Bigger Role in Defending Against Cyber Threats

CFOs and other top finance execs are being asked to play a bigger role in defending their firms against growing cyber threats, according to a recent a survey. As a result, IT may expect in 2016 to get more help in fighting cybercrime from the business side. 

Full Story >

Survey: Ping Identity Finds Employee Behaviors Can Be Big Contributors To Security Risks

A recent survey of 1,000 employees at large U.S. enterprise organizations finds that employee inattentiveness, laziness and possible malicious intent add up to constitute a real cyber security concerns.  The research was commissioned by security vendor Ping Identity.

Full Story >

Guidance Teams with Splunk & Lastline For Faster, Smarter Incident Response

Guidance Software is fortifying its endpoint detection and response with a new release of EnCase Endpoint Security, as well as new partnerships and deep integration with Splunk and Lastline. The goal is to cut time and complexity for threat detection and prevention.

Full Story >

Ravello, SimSpace Use Virtualization To Create True-To-Life CyberSecurity Simulations

Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.

Full Story >

Report: Webroot Finds Cybersecurity Threats Grow More Numerous, Complex

Every day, 85,000 new malicious IP addresses are launched, and the top phishing targets are technology companies and financial institutions, according to the new Webroot 2015 Threat Brief.

Full Story >

Survey: Consumers Have Big Concerns Over Security for Mobile Payment Platforms, Apps

Despite innovative mobile payments from giants Apple and Google, a recent survey finds practically everyone is worried about smartphone-based payment security.  Even credit cards weren’t the no-brainer choice, as more than 60% of U.S. respondents said cash is their Number One choice.  IDN looks at the Tripwire survey.

Full Story >

The CyberSecurity Plan -- A Developer's Perspective

The nation's first CyberSecurity Plan was released last month to mixed reviews. But drill past the sound bytes and front-line developers might actually find a few tidbits and recommendations that will prove important to them and their tech managers. IDN peels away the covers of the 64-page report, and makes it easy for you to send in your comments to Uncle Sam (which are due by mid-November). You'll also hear from fellow developers.

Full Story >

<< Start < Previous 1 Next > End >>
Showing 1 - 8 of 8

Videos

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist