X-Force June 19, 2015 Navigating a Sea of Threat Intelligence Specifications 7 min read - Standards and specifications make threat intelligence sharing a more manageable and organized act, although competing standards may still muddy the waters.
Risk Management June 19, 2015 Key Components of a High-Performing Information Risk Management Program 10 min read - Establishing a high-performing information risk management program requires efforts focused on risk identification, data protection and user behavior.
June 17, 2015 Log Management Is a Key Use Case for Big Data Solutions, Survey Shows 2 min read - Log management for security-related purposes has become one of the biggest use cases for big data solutions, a survey by the SANS Institute shows.
Advanced Threats June 10, 2015 Zero-Day Vulnerabilities Matter, but Don’t Ignore Known Issues 2 min read - Organizations funnel a lot of resources into defending against zero-day vulnerabilities, but these are not the only concerns they should pay attention to.
Incident Response June 9, 2015 Addressing Your Security Program One Small Step at a Time 2 min read - Organizations can form an effective security program by following a few basic best practices and dedicating themselves to a long-term effort.
Identity & Access June 8, 2015 It’s a Matter of Trust: Protecting Against Insider Threats 3 min read - Insider threats are a real concern for organizations, but enterprises can improve their security posture with the right management tools and best practices
Intelligence & Analytics June 5, 2015 Tips for Implementing Security Behavioral Analytics 3 min read - Behavioral analytics can comprehensibly develop models that would support an organization's ability to conduct risk assessment of resources.
Security Services June 4, 2015 Cloud Security and the Managed Services Provider: Hold the Pickle, Add More Lettuce 3 min read - A managed services provider that can offer flexible licensing terms and customized security solutions will fare better in competition than its rivals.
Intelligence & Analytics June 2, 2015 Outsourcing IT Security Infrastructure Is Like Hiring a Good Lawn Service Company 2 min read - Enterprises that take advantage of outsourcing to meet their security needs can benefit from lower costs and opportunities for future tech advancements.
CISO May 29, 2015 Business Continuity: The Unsung Hero of Security Intelligence 3 min read - In planning for and responding to a data breach, IT experts should work with business continuity teams as part of a cohesive incident response plan.