Artificial Intelligence August 22, 2016 Is Watson Like a Firefly? 3 min read - You've heard the buzz words "Watson" and "cognitive" floating like fireflies on a summer night. Watson is changing the future, one small step at a time.
Intelligence & Analytics August 17, 2016 Cybersecurity: This Is Not a Drill 2 min read - Organizations large and small must address many common cybersecurity vulnerabilities to keep up with the evolving threat landscape.
Data Protection August 16, 2016 As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying 3 min read - India has launched a series of initiatives aimed at overcoming cybersecurity challenges, decreasing costs and battling modern threats.
Government August 12, 2016 Advanced Analytics Help National Security Intelligence Analysts Detect Threats 2 min read - National security intelligence analysts increasingly rely on advanced analytics to keep up with the growing number of threats against the U.S.
CISO August 10, 2016 Millennials Are Not Burdens but Vital in the Security Workforce 2 min read - Millennials are not the problem; they're the future. The ability to attract and retain millennial talent is a vital to long-term success in security.
Advanced Threats August 4, 2016 Are Drone-Led Cyberattacks the Wave of the Future? 2 min read - As technology evolves and becomes increasingly available to consumers and fraudsters, drone-led cyberattacks may become more common.
Data Protection August 3, 2016 What’s in Your Event Cybersecurity Strategy? 4 min read - Event cybersecurity strategies and tools can help improve the digital security and, in turn, the physical security of guests at your event.
July 27, 2016 Research Shows Wide-Bandwidth DDoS Attacks Are Growing 2 min read - New research by Arbor Networks indicated that DDoS attacks are growing in both size and bandwidth, which is bad news for organizations.
CISO July 26, 2016 The Information Security Leader, Part 4: Three Persistent Challenges for CISOs 5 min read - Today's business climate presents challenges for CISOs regarding the definition of risk, uncertainties of measuring risk and effective communication.
July 21, 2016 HTTPoxy Can Enable Man-in-the-Middle Attacks 2 min read - A 15-year-old scripting vulnerability known as HTTPoxy is exposing many Linux distributions and programming languages to man-in-the-middle attacks.