Articles
  • Total data protection outside the firewall

    Gartner called Cloud Access Security Brokers (CASBs) the number one technology for information security in 2014. In fact, by 2016, 25% of enterprises will secure access to cloud-based services using a CASB platform.

    In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how Bitglass protects corporate data throughout its life cycle: in the cloud, at access, on the device, and on the corporate network.

  • Why saying YES is changing information security

    In this podcast recorded at RSA Conference 2015, Tsion Gonen, Chief Strategy Officer at Gemalto, talks about how the information security is a very different place than 5-10 years ago.

    The mindset of what organizations are doing remains largely unchanged, while everything else around them is evolving. Think about it, five years ago the data center was not fully virtualized and most of your infrastructure wasn't in the cloud. When you have such a large gap between the way you use data and the way you're supposed to secure it, you're going to break things down.

    The most valuable information security tool of the past, the denial, is dead. The threat surface is increasing dramatically, yet CISOs are under pressure to say yes to new technologies and hardware, to enable easier collaboration, sharing, BYOD.

  • Product spotlight: Entrust IdentityGuard

    All organizations require the means to authenticate the identities of users, machines or mobile devices for access to sensitive networks, services, applications or facilities.

    Existing point authentication solutions are no longer up to the task of thwarting advances that exploit vulnerabilities in a variety of channels or mediums. Whether the root threats originate from internal or external sources, critical information, data and identities are at constant risk.

    In this podcast recorded at RSA Conference 2015, Chris Taylor, Senior Product Manager at Entrust Datacard, talks about Entrust IdentityGuard, one of the most robust authentication and identity-assurance platforms.

  • Defend your network from APTs that exploit DNS

    Advanced Persistent Threats (APTs) are designed to spread, morph and hide within IT infrastructure to perpetrate a long term attack, posing a significant threat to the security of corporate data. From the world’s largest banks, to a healthcare provider, to a German iron plant, no sector escaped a malware and APT breaches in 2014.

    Malware and APTs commonly use the Domain Name System (DNS) as a communication mechanism for these breaches. And yet many companies are not taking the necessary precautions to detect and mitigate against these types of attacks. Nor are they using the best tool at their disposal to combat these threats – DNS itself.

  • IoT and the great data heist

    The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home.

    With the introduction of new mobile devices in every facet of our lives, we have increased our understanding of the environment around us but also within us. A conversation I had with the manufacturer of one wearable wristband at this year’s Mobile World Congress even surprised me regarding the amount of data it collected.

  • ThreatStream's approach to threat intelligence

    Imagine being able to make sense of all the threat information that’s flowing through your security controls and coming from your threat feeds in minutes, not weeks, months or years.

    In this podcast recorded at RSA Conference 2015,Trevor Welsh, Sales Engineering Manager at ThreatStream, talks about how the ThreatStream OPTIC threat intelligence platform makes sense of all of the threat data that security teams have to sort through to find the needle(s) in the haystack that can threaten your business, customers, intellectual property and reputation.

  • How long is the wait?

    Does this question sound familiar? You have probably asked this question several times. Nobody likes to wait. But yet, we wait at restaurants, to see the doctor, and to get our hands on the latest cool tech gadget. We spend a lot of time waiting and we have grown accustomed to it. Having to wait even extends to cybersecurity. Waiting twenty minutes for a table may be tolerable, but waiting for an update to secure your network is not.

  • Product spotlight: Targeted threat intelligence from Solutionary

    As IT security threats have become more targeted to specific industries, organizations and even individuals, the need has arisen for threat intelligence that is tailored for individual organizations.

    In this podcast recorded at RSA Conference 2015, Joseph Blankenship, Director of Marketing at Solutionary, talks about how they provide clients with advance, actionable intelligence to improve situational awareness, identify targeted threats and potentially avoid attacks altogether.

  • APTs: The fine balance of control and monitoring

    Security is not about winning the war. It is more like insurance, it's about how we handle risks. In order to successfully handle the risk of Advanced Persistent Threats (APTs) we need to focus on the high stake targets that we want to protect. The challenge, then, is to build a multi-layered security architecture with the right balance of control and monitoring technologies that can prevent any lower-impact threats from escalating into a full blown attack.

  • Classification and protection of unstructured data

    In this podcast recorded at RSA Conference 2015, Stephane Charbonneau, CTO of TITUS, talks about TITUS Classification Suite 4, a significant new release of its flagship data identification and information protection suite.

    Already in use by the French Ministry of Defense and others, the new solution uses content and context to automatically classify and protect information as it is handled by users, and allows manual and guided classification for maximum flexibility and user engagement. Fine-grained policy control and comprehensive metadata capture also leverages overall security investment, improves data management and increases regulatory compliance.

Videos      Podcasts



Spotlight

Keeping passwords safe from cracking

A group of researchers from Purdue University in Indiana have come up with an effective and easy-to-implement solution for protecting passwords from attackers.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, May 22nd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //