Preview Mode Links will not work in preview mode

Real-world conversations with top security execs. Prepare to be enlightened, engaged, perhaps challenged & definitely informed while getting to know the pros responsible for it all.

Jul 28, 2015

How effective are Security Analytics tools and how do you compare their operational effectiveness?

After spending months researching this subject, Gartner's Dr. Anton Chuvakin says the long and short is that they just don't know how well the tools work as there isn't much data on the operational effectiveness of...

Jul 23, 2015

It no longer is will an intruder will gain access to your network, it is just a matter of when they will gain access.

Cybersecurity company Datex, Inc. says employees will make mistakes, user credentials will be compromised, data theft will happen and compliance mandates will not be met.

Its DataStealth service...

Jul 20, 2015

SIEM stands for Security Information and Event Management.

SIEM is continuing to grow in usage but where does it stand in terms of cloud deployments and what is its cloud-based market share?

Gartner's Dr. Anton Chuvakin challenges the idea that one can compute market share for "Cloud SIEM" products because they...

Jul 14, 2015

Massive database breaches have resulted in millions of user identification and authentication profiles being compromised. Identifying unauthorized attempts to access systems or accounts is a basic requirement for financial institutions, etailers, retailers, healthcare provides and other enterprises.

Knowing the...

Jul 10, 2015

With experts citing employees being compromised by attackers as a primary cause of security breaches, many enterprises are seeking new training methods.

Spun out of Carnegie Mellon University, Wombat Security takes what it says is a different approach that applies learning science principles. Gone are traditional...