Data Analysis and Classification News
October 09, 2015
News roundup: The EU Court has invalidated the Safe Harbor agreement, leaving companies scrambling to deal with overseas data transfers securely. Plus: SHA-1 collision attack; NIST email security initiatives; worry over cyberthreats.
August 25, 2015
Video: Threat intelligence tools are a growing market and enterprises need to be able to see through the hype to get the best product for them.
May 21, 2015
A new study shows enterprises with security analytics are confident in their threat detection capabilities, while those without are overwhelmed by copious false positives and alerts.
May 19, 2015
Network security vendor Fortinet and DHS signed an agreement on security information sharing for better cyber protection in the public and private sectors.
Data Analysis and Classification Get Started
Bring yourself up to speed with our introductory content
Learn the ins and out of securing big data, from the key risks facing big data environments to the skills infosec pros need to master to handle this growing responsibility. Continue Reading
Expert Ajay Kumar revisits the topic of data obfuscation techniques and explores the architectures, approaches and best practices for protecting enterprise data. Continue Reading
The security analysis tools that provide advanced analytics are essential to counter the latest threats to enterprise systems and data. These products gather and analyze data from many different sources within an organization, and they provide ... Continue Reading
Evaluate Data Analysis and Classification Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
User behavior analytics can be used for a number of different objectives within an enterprise. Expert Ajay Kumar examines some of the most important features and capabilities. Continue Reading
User behavior analytics can be beneficial to enterprises, but there are complexities involved. Expert Ajay Kumar explains what companies should know about this new technology. Continue Reading
Security professionals are playing an ever-greater role in managing business risk. Their efforts against top cybersecurity threats include investing in the latest defensive tools that promise to shut down attackers.
At the top of enterprises' ... Continue Reading
Manage Data Analysis and Classification
Learn to apply best practices and optimize your operations.
HIPAA data breach reporting now uses an electronic Web portal, so what does this mean for covered entities? Expert Mike Chapple explains. Continue Reading
How do they know it’s really you? New behavioral technologies use data science to monitor user activity within the network. Continue Reading
The data science that reprogrammed Wall St. trading models may offer lessons for security. Continue Reading
Problem Solve Data Analysis and Classification Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt of Cybersecurity and Applied Mathematics, authors Leigh Metcalf and William Casey explain string analysis and how it can be applied to cyber data. Continue Reading
Real-time behavioral threat analytics is the next frontier in security. Learn how a behavioral threat assessment tool can protect your enterprise systems and data. Continue Reading
The best data-classification programs are simple and easy to use. Expert Mike Chapple outlines his four must-have data-classification categories. Continue Reading