6 seconds on how Watson learns more from less data.

No More Paralysis by Analysis: How Security is Evolving to Real-Time Outcomes

|
A well-known CISO customer was recently telling me about his experience with implementing new security solutions. His consistent feeling? Dread – the security alerts and things that can suddenly break in the beginning can be overwhelming. “Everything goes red,” he said, referring to the immediate influx of red alerts and ... Read More
It’s 2018. How does Silicon Valley think about a Series B these days?

It’s 2018. How does Silicon Valley think about a Series B these days?

|
With Silicon Valley continuing to lead the nation in VC funding (source: Bloomberg), expectations are clear: invest that funding and deliver, deliver, and deliver some more for your customers (and investors, employees, partners and stakeholders) ... Read More
The Power of Preempt and Demisto

How to Strengthen Your Cyber Security DNA

Cyber security is a complex animal that requires many disciplines and a diverse toolkit. Typically, resources are limited, and incident response and security staff are overloaded with noise, irrelevant alerts and incomplete static information. With so many diverse systems its difficult to utilize them in a coordinated and timely way ... Read More
We’re #1! And #2, #5, and #6 in Gartner Top 10 Security Projects

We’re #1! And #2, #5, and #6 in Gartner Top 10 Security Projects

At the recent Gartner Security & Risk Management Summit, analysts presented their findings on the top technologies for information security and their implications for security organizations in 2018. At the event Neil MacDonald highlighted Top 10 Security Projects for Security and Risk Management Organizations. He continues by emphasizing that these ... Read More
Detection Only Solutions Aren't Enough For Today's Security Teams

Detection Only Solutions Aren’t Enough For Today’s Security Teams

Last week I had the opportunity to speak with several CISOs about what they are doing to deal with cyberattacks, breaches and internal threats. A consistent theme I heard is that detection only solutions aren't enough. They need more practical approaches to rapidly respond to anomalous behavior and they need ... Read More
6 Tips for Securing Privileged Accounts in the Enterprise

6 Tips for Securing Privileged Accounts in the Enterprise

Protecting privileged accounts and actively responding to any potential compromises has become a critical initiative for many CISOs. Stolen credentials are at the heart of most all modern attacks and breaches. Attackers can easily obtain credentials via phishing attacks, brute force, keyloggers, pass-the-hash techniques, or using a database of previously ... Read More
Simplifying PCI DSS 3.2 Compliance with Preempt

Simplifying PCI DSS 3.2 Compliance with Preempt

If your organization handles credit cards, you are no doubt familiar with Payment Card Industry Data Security Standard (PCI DSS) compliance. PCI DSS is a set of requirements and procedures that have been established in order to strengthen security of cardholder transactions and data in order to reduce fraud. PCI ... Read More
Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior

Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior

I’ve heard it many times from customers: “IT Security needs to be transparent to users in order to be successful.” Unfortunately, we are now in a digital age where things have dramatically changed and research has shown over and over that credential compromise is the top way that hackers breach ... Read More
Study Finds Employee Security Habits Reveal Risky Imbalance

Study Finds Employee Security Habits Reveal Risky Imbalance

Human nature motivates us to enhance productivity, make things easy, find workarounds and to crave information that is being kept from us. How do these motivations change the way people work? Do their actions put their company at risk? Do IT Security teams need to understand basic psychology to protect ... Read More
How this Retailer Could have Kept my Business with Better IT Security Process

How this Retailer Could have Kept my Business with Better IT Security Process

Hmm, I thought I remembered my password. As I tried to log into my account with a large retailer known for their athletic wear, I click the forgot password link. I enter my email address ... Read More
Loading...