Security incident and event management (SIEM) products are no longer just for large enterprises. This article will help determine if SIEM is for you.
Security incident and event management (SIEM) products go a stage beyond security infrastructures comprised of a firewall, an intrusion prevention system (IPS) and endpoint protection. SIEM systems manage … more »
Startup Sift Science wants to take fraud prevention to the next level with its platform powered by machine learning.
Despite growing EMV adoption, hackers still see point-of-sale (POS) systems as low-hanging fruit.
Anomaly detection is growing in popularity as organizations get proactive about incident response. These practices help you get the most out of anomaly detection.
The CISO and the chief data officer must work well together, given the importance of secure data access. Here are tips for fostering a C-suite partnership.
Single sign-on solutions help users cope with password pressures by enabling a single authentication event to offer access to multiple applications.
OAuth 2.0 can be an effective authorization method. Here we offer tips on implementing and using an OAuth 2.0 authorization server using the OWIN framework.