Intelligence & Analytics October 29, 2014 How Big Data and Advanced Analytics Can Amplify Security Intelligence 2 min read - Security intelligence is not a game, and it's an area where you can't afford to lose. Here are three key components of a successful IT security strategy.
Security Services October 9, 2014 Asset Accuracy and Workflow Status Vital for Optimal Security Intelligence and Operations 3 min read - To enhance the effectiveness of your security intelligence program, you must work to provide up-to-date, accurate information to your MSSP.
Intelligence & Analytics October 2, 2014 Why Is ‘Security Intelligence’ So Hard? 4 min read - Let's clear up the misinterpretations and explore the structural differences between big data, information, security intelligence and real intelligence.
CISO September 25, 2014 How to Present Information Security Topics to a Non-Security Audience 3 min read - When presenting to people outside the information security industry, certain measures need to be taken including using common language and concepts.
CISO September 24, 2014 How a CISO Can Use Home Field Advantage to Defeat Attackers 4 min read - How CISOs and security leaders should use their home field advantage and play to their strengths to win the battle against malicious attackers.
Endpoint September 19, 2014 Bring Your Own Device: The Enterprise IT Challenge That Isn’t Going Away 2 min read - The bring your own device (BYOD) trend is probably here to stay, which means companies will need to secure their entire software stack, not just endpoint.
Intelligence & Analytics September 11, 2014 Why Turning Data Into Security Intelligence Is So Hard 4 min read - A trip to a graveyard leads to insights on why turning massive volumes of data into security intelligence can be so difficult — and how to simplify it.
Risk Management September 3, 2014 Do’s and Don’ts: Security Management in a Growing Company 4 min read - Does your company growth make security management a challenging issue? These valuable tips might just save you the trouble dealing with the risks.
Mainframe August 28, 2014 Intrusion Prevention and the Seven-Year Itch 3 min read - Intrusion prevention technology has had to continuously evolve in the past seven years to meet today's network security needs.
Security Services August 19, 2014 How to Get the Most Value out of Your MSSP and Security Operations 2 min read - If you currently rely on a third-party MSSP or are considering engaging one to enable your security operations capability, consider these factors.