Walking through downtown Palo Alto for lunch last week I noticed something a bit strange. Restaurants and cafes were strangely quiet. VCs, techies, and students were all focused on the big screens. Not watching a Cardinal game or talk show or The Price is Right.
Data breaches garnered a lot of media attention in 2014, and so far that momentum has carried forward into 2015.
We recently announced the Nexgate Social Threat Center, a real-time social media security operations console.
In other poorly timed news, the US State Department’s Office of Inspector General (OIG) released a report this week detailing the agency’s poor email management practices and general State of Departmental Confusion regarding business
Microsoft Office 365 is compliant with a number of important global standards and regulations, ranging from European Union data protection laws to the Health Insurance Portability and Accountability Act and ISO 27001.
“The Hacker Way is an approach to building that involves continuous improvement and iteration. Hackers believe that something can always be better, and that nothing is ever complete.”–Mark Zuckerberg
Security analytics can be a valuable source of innovation, but before results can be realized, there are key commitments and costs to consider.
Earn a Better Return on Threat Detection
Spending increase in cybersecurity as a response to growing threats
Back from the frozen tundra of LegalTech New York, which again produced a very interesting few days of discussion with customers and partners - and very informative content.
Sony Pictures has spent approximately $15 million in investigation and remediation costs related to its recent cyberattack—and last week Anthem reported the largest healthcare data breach on record.