I am always searching for metaphors that will help communicate basic security concepts and demonstrate the danger zones in the new security landscape. I tend to reach into our personal lives for these metaphors. I do this because I know… Read More
For information security professionals, contextual, enriched alerts are exponentially more valuable than sexy dashboards. Ben Johnson explains why.
(Editor’s note: This blog appears as part of the eBook, “Should You Buy Endpoint Security from a Network Security Vendor?” available here.) By Richard Stiennon, Chief Research Analyst, IT-Harvest Decoupling, an engineering term used to describe breaking a problem into its component… Read More
Carbon Black set the bar by providing an open and extensible platform on which anyone can extend integrations, interfaces and workflows. Bit9 now follows in those footsteps with a RESTful API that enables our customers and partners to create all… Read More
It has been well publicized that the healthcare industry has been targeted in recent years by cyber attacks—some exposing up to 80 million patient records. So the leak of roughly 32,000 records from California-based Cottage Health System in 2013 seemed… Read More
According to the Internal Revenue Service, attackers used stolen data to gain access to tax returns of more than 100,000 people via the IRS website. As reported by the New York Times, “using Social Security numbers, birth dates, street addresses… Read More