You Are Browsing ‘Data Security ’ Category

Comments Off on Advanced Threat Detection and Remediation: Why It’s Needed
In 2014 detected cyber security incidents rose sharply to 42.8 million, and the financial impact of cyber crime increased by 34 percent. An effective cyber security program has never been more important. And an effective program must not only attempt to detect and block incoming threats, it must detect and neutralize successful attacks before the damage is done. This white paper explains why advanced threat detection is now a necessary part of any ...
Comments Off on The ESG Cybersecurity Maturity Model
How does your cyber security program compare to other companies? Where do your security people, processes, and technology place you among peer organizations? And more important, what should be your next steps to improve your program? Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced. Read this report to learn: • The security phil...
Comments Off on State of Security Operations 2015
Your ability to detect and stop cyber attacks depends on the effectiveness of your security operations team. How does yours stack up to the best? And what should you do to improve? HP Security Intelligence and Operations Consulting has assessed the capabilities of 87 security operations centers worldwide. This updated 2015 report bring you the latest information. Read it to learn: • The latest trends in security defenses and operations â...
Comments Off on Internet of Things Security Study: Home Security Systems Report
Home security and remote monitoring systems are a major application of the Internet of Things (IoT). Most include sensors, motion detectors, video cameras, and recorders—all connected via the cloud to a mobile device or the web. But are they—and IoT applications in general—secure from hackers? This research study uses HP Fortify on Demand to test 10 popular home security systems. The results will make you feel anything but secu...
Posted on Aug 9 2015 - 3:22pm by Newsfeed
Comments Off on IBM, Temasek Polytechnic to train cyber security professionals for Singapore
(Source: Enterprise Innovation)  The opening of the Temasek Polytechnic-IBM Security Operations Centre (SOC) will ... The Ponemon 2015 Cost of a Data Breach Study has also found that the ......
Posted on Aug 9 2015 - 3:16pm by Newsfeed
Comments Off on Old Intel chips are vulnerable to a fresh security exploit
(Source: Engadget) If you have an old, Intel-based computer hanging around, you might want to get rid of it post-haste. Security researcher Chris Domas has discovered a ......
Posted on Aug 5 2015 - 4:28pm by Newsfeed
Comments Off on Secured2 and LiquidCool Team for ‘Unhackable’ Data Security
(Source: The VAR Guy) The Holy Grail of data security is an “unhackable” solution, which seems very difficult to accomplish in these days of increasingly sophisticated security attacks ......
Posted on Aug 5 2015 - 4:25pm by Newsfeed
Comments Off on BlackHat 2015: Firms must switch focus to data security, says Imperva
(Source: ComputerWeekly.com) The security firm detailed this emerging threat, dubbed man-in-the-cloud ... need to switch focus from endpoint and perimeter securityto data monitoring and ......
Posted on Jul 27 2015 - 1:55pm by Newsfeed
Comments Off on Why VASCO Data Security (VDSI) Could Be an Impressive Growth Stock
(Source: Zacks.com)  One such company that might be well-positioned for future earnings growth is VASCOData Security International Inc. (VDSI - Snapshot Report). This firm, which ......
Posted on Jul 27 2015 - 1:37pm by Newsfeed
Comments Off on How (not) to pay yourself a $14m bonus – 60 Sec Security [VIDEO]
(Source: Naked Security) Join thousands of others, and sign up for Naked Security'snewsletter ... How likely are you to recommend Naked Security to a friend or colleague? 0 1 2 3 4 5 6...