Data breach

Data breach News

View All News

Data breach Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data breach Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Data breach

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Data breach Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Is the CISO job description getting out of hand?

    CISO roles and responsibilities are built on impossible standards and unrealistic expecations. Expert Joseph Granneman explains this trend and why enterprises need to reverse it. Continue Reading

  • Five network security lessons learned from the Sony Pictures hack

    Following the Sony Pictures hack, several of the company's network security shortcomings were revealed. Expert Kevin Beaver explains how better network security may have prevented the extent of the breach. Continue Reading

  • Are SIEM products delivering on advanced analytics?

    Faced with a deluge of security and log information, enterprises are overwhelmed by different types of data and finding it harder to respond to potential security events. Interest in security information and event management (SIEM) is increasing as companies look to detect breaches earlier and limit damage, but information overload -- false positives -- and missed signs of advanced attacks continue to be major problems. Big data technologies and advanced analytics have promised to deliver better and more complete threat detection. Should these systems be combined with SIEM products, or is it time to move on? In our cover story, we report on realistic expectations with SIEM products and data analytics today, and what actions companies may want to consider going forward.

    As some enterprises look to advanced analytics for help, we revisit the concept of "good enough" security in the wake of the Sony Pictures Entertainment hacking scandal. CISOs, chief technology officers, and IT security and risk managers weigh in: Will security management have greater influence on business risk decisions in light of the security implications going forward? We report our findings. Finally, we have all heard about the benefits of vulnerability rewards programs, but what about the risks? Organizations outside of the technology industry may not be convinced about the rewards of bug bounty programs. We explore both sides of the issue.

     Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close