It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells.
Download this eBook interview transcript with Laurence Pitt of Juniper Networks and learn about:
Data's true value in today's economy;
How organizations are exposing...
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells, says Laurence Pitt of Juniper Networks. He offers insights on leveraging and securing data.
The latest statistics on data center breaches show that perimeter firewalls are still not impenetrable. But what cyber criminals count on is what they will find beyond the perimeter - a hardware-centric security model that has remained unchanged for years.
Download this whitepaper and learn:
Traditional perimeter-centric data center security strategies are no longer effective against today's malicious and highly sophisticated attacks. While tremendous effort, resources, and technology are applied to securing the perimeter of the data center, until recently, nothing resembling that same level of thought...
How can a supercomputer help enterprise security teams respond to today's evolving threat landscape? Martin Borrett of IBM and Ronan Murphy of Smarttech discuss the promise and impact of Watson for Cyber Security.
Chances are, your organization has a good grip on cybersecurity. You're collecting data on events and alerts, logs and configurations, and user and network activity. But is your good grip really just a good start? Think how much more you could do if your threat-fighting strategies could also draw on information that...
The estimated size of the black market for data in India is pegged at around $1 billion by an industry report. So what does this black market look like? How is the data procured, collated, validated and sold? And most importantly, what effect is this pilferage of data having on Indian enterprises?
This session will...
The best starting point for effectively safeguarding data and protecting against breaches is to clearly understand what kind of data an organization has, where it's located and the risks, says Jason Hart of Gemalto.
Hackers have apparently hijacked potentially thousands of vulnerable MongoDB databases and demanded ransoms for the return of critical data, with some victims paying up, according to security researchers.
Security leaders say data science is becoming the building block of contemporary security solutions, showing great promise for developing necessary cyber defences. But where and how is data science best deployed?
IBM's Vaidyanathan Iyer says security practitioners need new tactics to bridge the skills gap and fight emerging threats. He suggests the use of analytics and machine learning would easily help fill the gap in detecting threats.
Ransomware, regulations, botnets, information sharing and policing strategies were just some of the topics that dominated the "International Conference on Big Data in Cyber Security" hosted by Edinburgh Napier University in Scotland.