Data Analysis and Classification News
October 09, 2015
News roundup: The EU Court has invalidated the Safe Harbor agreement, leaving companies scrambling to deal with overseas data transfers securely. Plus: SHA-1 collision attack; NIST email security initiatives; worry over cyberthreats.
August 25, 2015
Video: Threat intelligence tools are a growing market and enterprises need to be able to see through the hype to get the best product for them.
May 21, 2015
A new study shows enterprises with security analytics are confident in their threat detection capabilities, while those without are overwhelmed by copious false positives and alerts.
May 19, 2015
Network security vendor Fortinet and DHS signed an agreement on security information sharing for better cyber protection in the public and private sectors.
Data Analysis and Classification Get Started
Bring yourself up to speed with our introductory content
Expert Ajay Kumar revisits the topic of data obfuscation techniques and explores the architectures, approaches and best practices for protecting enterprise data. Continue Reading
The security analysis tools that provide advanced analytics are essential to counter the latest threats to enterprise systems and data. These products gather and analyze data from many different sources within an organization, and they provide ... Continue Reading
Advanced security analytics uses information gathered from SIEMs and other security tools to safeguard the enterprise. Learn how advanced analytics works and what's coming next. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Data Analysis and Classification Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security professionals are playing an ever-greater role in managing business risk. Their efforts against top cybersecurity threats include investing in the latest defensive tools that promise to shut down attackers.
At the top of enterprises' ... Continue Reading
Threat intelligence services can be valuable, but enterprises must first determine the right threat intelligence metrics. Char Sample explains the best ways to achieve this. Continue Reading
Data obfuscation techniques can help enterprises protect corporate information and limit risks of data exposure or leaks. Expert Ajay Kumar explains how these techniques work. Continue Reading
Manage Data Analysis and Classification
Learn to apply best practices and optimize your operations.
HIPAA data breach reporting now uses an electronic Web portal, so what does this mean for covered entities? Expert Mike Chapple explains. Continue Reading
How do they know it’s really you? New behavioral technologies use data science to monitor user activity within the network. Continue Reading
The data science that reprogrammed Wall St. trading models may offer lessons for security. Continue Reading
Problem Solve Data Analysis and Classification Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt of Cybersecurity and Applied Mathematics, authors Leigh Metcalf and William Casey explain string analysis and how it can be applied to cyber data. Continue Reading
Real-time behavioral threat analytics is the next frontier in security. Learn how a behavioral threat assessment tool can protect your enterprise systems and data. Continue Reading
The best data-classification programs are simple and easy to use. Expert Mike Chapple outlines his four must-have data-classification categories. Continue Reading