Most organizations are challenged by having too much information in too many places. But Dieter Schuller of Radiant Logic says centralizing data can improve identity management.
Barracuda Networks announces the release of a firewall designed to meet the needs of small and mid-sized organizations. Read more about this and other news releases issued at RSA Conference 2013.
Russ Dietz of Websense likes to ask organizations: Do you really know who has access to your data? The answers often lead to uncovering security vulnerabilities that have been overlooked.
Advanced threats require an advanced security strategy. Oliver Friedrichs of Sourcefire recommends a threat-centric security approach. In this interview, he explains exactly what that entails.
Paige Leidig, chief marketing officer of CipherCloud, says information protection requirements continue to be the primary hurdle for enterprise adoption, despite explosive growth in the cloud content and collaboration market and its evident advantages to productivity and cost efficiencies.
Outsourcing to the cloud poses new risks, especially for card data. The PCI Council addresses those risks in its just-released cloud security guidance, and Bob Russo offers exclusive insights.
As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.
In the last few months, major U.S. banking institutions have been victims of a powerful wave of distributed-denial-of-service attacks that combine three different attack tools. These "Triple Crown" attacks take DDoS to a whole new level. How can institutions improve their defenses?
Join this session for expert...
With Congress facing $1.2 trillion in budget cuts, Federal Chief Information Officer Steven VanRoekel says funding for cybersecurity initiatives will likely be affected. But with smart planning, government information technology should not be placed at risk.
IBM's Dan Hauenstein, in analyzing Big Blue's 2012 Tech Trends Report, says security concerns often inhibit the adoption of four technologies: mobile, cloud, social business media and business analytics.
Mobile malware and cloud-based botnets will be top cyberthreats for 2013, says Georgia Tech's Paul Royal. How should organizations address these and other upcoming threats in the New Year?
Cloud-based botnets and mobile malware are two of 2013's top cyberthreats. What other threats make the list? Georgia Tech's Paul Royal tells how security pros and organizations can prepare.
The kind of detailed data analysis that helped statistician Nate Silver predict accurately the outcome of the U.S. presidential election could help enterprises using cloud-based SIEM to identify vulnerabilities, says Cloud Security Alliance's Jens Laundrup.
This whitepaper from Forrester Research, "Kill Your Data to Protect it From Cybercriminals," shares best practices about how you can make cybercriminals bypass your network and look for less robustly protected targets, and addresses why key and certificate management is becoming the benchmark for effective security...
Mobility continues to change the landscape for security professionals concerned with data loss and the growing number of endpoints, says CTO Dan Hubbard, who offers mitigation strategies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.