Every year the RSA conference brings together members of the cybersecurity community for a week of presentations, discussions, tech demos and socials. Concurrent with the event there is always a flurry of press releases. Many are designed to highlight a company’s product or service. Many, like the announcement of the new Microsoft led coalition of tech firms, might be well … [Read more...] about Global Cyber Alliance Release: Perhaps the most important of the 2018 RSA Conference Season
Cloud Access Security Brokers (CASB) have been hot for the last 5 years. But how do you select a CASB? It has gotten to the point where every firm is either using one, evaluating one, or studying how to use them. This makes sense, since any successful cloud transition strategy should including appropriate attention being placed on how to secure, control and manage corporate … [Read more...] about How Do I select a Cloud Access Security Brokers (CASB)?
Qlik delivers intuitive platform solutions for self-service data visualization, guided analytics applications, embedded analytics and reporting to approximately 40,000 customers worldwide. Companies of all sizes, across all industries and geographies, use Qlik solutions to visualize and explore information, generate insight and make better decisions. Qlik optimizes Business … [Read more...] about Qlik: Fast visual analytics for business intelligence
The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. The bad news is that neither the press nor the government is placing the Sony attack in context. Considering the Sony case in isolation is equivalent to looking at a single piece on a chessboard, hardly an effective way to … [Read more...] about The Sony Hack in Context
Every year for 19 Years Symantec has produced an Internet Security Threat Report, capturing insights which can inform defenses. Their April 2014 report has proven to be particularly insightful, foreshadowing many of the events seen from that month to today. For example, in 2012, there were 156 major data breaches increasing to 253 in 2013. Of these, an increasing … [Read more...] about We Are Living In The Age of the Mega-Breach