Imagine being able to make sense of all the threat information thatís flowing through your security controls and coming from your threat feeds in minutes, not weeks, months or years.
In this podcast recorded at RSA Conference 2015,Trevor Welsh, Sales Engineering Manager at ThreatStream, talks about how the ThreatStream OPTIC threat intelligence platform makes sense of all of the threat data that security teams have to sort through to find the needle(s) in the haystack that can threaten your business, customers, intellectual property and reputation.
Does this question sound familiar? You have probably asked this question several times. Nobody likes to wait. But yet, we wait at restaurants, to see the doctor, and to get our hands on the latest cool tech gadget. We spend a lot of time waiting and we have grown accustomed to it. Having to wait even extends to cybersecurity. Waiting twenty minutes for a table may be tolerable, but waiting for an update to secure your network is not.
As IT security threats have become more targeted to specific industries, organizations and even individuals, the need has arisen for threat intelligence that is tailored for individual organizations.
In this podcast recorded at RSA Conference 2015, Joseph Blankenship, Director of Marketing at Solutionary, talks about how they provide clients with advance, actionable intelligence to improve situational awareness, identify targeted threats and potentially avoid attacks altogether.
Security is not about winning the war. It is more like insurance, it's about how we handle risks. In order to successfully handle the risk of Advanced Persistent Threats (APTs) we need to focus on the high stake targets that we want to protect. The challenge, then, is to build a multi-layered security architecture with the right balance of control and monitoring technologies that can prevent any lower-impact threats from escalating into a full blown attack.
In this podcast recorded at RSA Conference 2015, Stephane Charbonneau, CTO of TITUS, talks about TITUS Classification Suite 4, a significant new release of its flagship data identification and information protection suite.
Already in use by the French Ministry of Defense and others, the new solution uses content and context to automatically classify and protect information as it is handled by users, and allows manual and guided classification for maximum flexibility and user engagement. Fine-grained policy control and comprehensive metadata capture also leverages overall security investment, improves data management and increases regulatory compliance.
Apple products have increasingly gained popularity in enterprise environments due to perception that they are so secure they will never get attacked and no data will be leaked, but will they become a bigger target due to their growing market share?
In this podcast recorded at RSA Conference 2015, Zoran Cocoara, Sales and Business Development Manager at CoSoSys, talks about the integration of Macs in the enterprise and the need for Data Loss Prevention for OS X.
In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends happening in enterprise IT today. There's not a single enterprise out there that's not dealing with these challenges at some level, with the most significant being security and compliance.
Organizations are having a tough time controlling the underlying infrastructure and the applications. With an increasing amount of data moving outside of the traditional perimeter, it's essential to focus on protecting that data. Learn more about the challenges in this podcast.
Dr. Klaus Kursawe is the Chief Scientist at the European Network of Cyber Security (ENCS), where he is leading the research and development activities for critical infrastructure security. In this interview he talks about the challenges related to smart grid security.
There's been an explosion of companies that realized threat intelligence was the next frontier.
In this podcast recorded at RSA Conference 2015, Trevor Welsh, Sales Engineering Manager at ThreatStream, talks about how in the security space, our adversaries are not machines or artificial intelligence, they're people. This means that information security companies are trying to beat the enemy with scale and consistency.
In this podcast recorded at RSA Conference 2015, Wolfgang Kandek, CTO at Qualys, talks about the recently announced Qualys Web Application Firewall (WAF) version 2.0, that comes fully integrated with the Qualys Web Application Scanning solution (WAS).
The new release includes virtual patching capabilities to enable organizations to fine-tune security policies, remove false positives and customize rules leveraging vulnerability data from the Qualys WAS.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.