When cyber criminals strike, they go out of their way to hide actions, misdirect investigators, and even evade detection tools. Often, security teams start the incident response process in the dark, with little more than source and destination IPs, a category, and a proposed severity.
IT needs to address security gaps in the platform before getting buy-in from interested parties
(Following-up on the Financial Services Info Chaos post from last week )
Walking through downtown Palo Alto for lunch last week I noticed something a bit strange. Restaurants and cafes were strangely quiet. VCs, techies, and students were all focused on the big screens. Not watching a Cardinal game or talk show or The Price is Right.
Data breaches garnered a lot of media attention in 2014, and so far that momentum has carried forward into 2015.
We recently announced the Nexgate Social Threat Center, a real-time social media security operations console.
In other poorly timed news, the US State Department’s Office of Inspector General (OIG) released a report this week detailing the agency’s poor email management practices and general State of Departmental Confusion regarding business
Microsoft Office 365 is compliant with a number of important global standards and regulations, ranging from European Union data protection laws to the Health Insurance Portability and Accountability Act and ISO 27001.
“The Hacker Way is an approach to building that involves continuous improvement and iteration. Hackers believe that something can always be better, and that nothing is ever complete.”–Mark Zuckerberg
Security analytics can be a valuable source of innovation, but before results can be realized, there are key commitments and costs to consider.