Preview Mode Links will not work in preview mode

Real-world conversations with top security execs. Prepare to be enlightened, engaged, perhaps challenged & definitely informed while getting to know the pros responsible for it all.

Jun 29, 2015

Many security policies are aspirations, doomed to fail because they are unrealistic. Not only can they be unachievable, but may in fact encourage people to disregard policies because, after all, "we can't really do that." 

Further, enterprises may not be able to collect on cyber insurance policy payouts because they...

Jun 5, 2015

Most "new" security technologies use functions and features developed years ago. Network Forensics applies machine learning, automating detection functions via machine-based analytics to decode and visualize relevant metadata.

Accordingly, Network Forensics represents an evolutionary trend in security. Who is providing...

Jun 1, 2015

In this interview with an information security officer who prefers to remain anonymous we discuss the definitions of security intelligence, what it takes to be a CISO and the toughest part about heading up security at an enterprise. 

He also discusses how network complexity grows as new systems are built on top of...