A group of prominent technology vendors are teaming to offer a highly secure data infrastructure built on Security-Enhanced Linux.
A group of technology vendors at last week’s GEOINT 2015 conference demonstrated a data infrastructure they claim could stop hackers in their tracks.
The Multilevel Secure System (MLS) combines technology … more »
Prelert first sold its anomaly detection technology to IT operations teams – but then customers begged them to create similar products for enterprise security.
It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.
What can Bruce Lee teach your security team about dealing with cyber threats?
Only 21 percent of respondents continuously monitor user behavior to thwart insider attacks, finds a Crowd Research Partners survey.
Targeting enterprise databases is a common attack tactic, as the Anthem breach showed, yet many companies neglect database security.
Nearly 18 percent of files in enterprise-approved apps violate DLP policies, finds a Netskope study. The worst offender: cloud storage apps.