155 Search Results

  • 23 March 2015

    EventTracker simplifies SIEM for labor union

    A large labor organization with 350 staff serving more than 300,000 members across North America was seeking a log management offering that would help it meet government data-security requirements, as well as support its IT team.

  • 16 March 2015

    E8 Security comes out of stealth with intelligence, analytics to combat insider threats

    Understanding and addressing the insider threat is a hot topic. Adding to a growing list of insider threat detection and response vendors, E8 Security is looking to leverage the power of machine-learning-based anomaly detection technology.

  • 9 March 2015

    Who is the malicious insider... who? RedOwl swoops in to find out

    Winner of the 2014 RSA innovation award, RedOwl Analytics believes the key to successfully identifying rogue insiders is to utilize data science techniques to piece together content found across disparate systems and build a model around user sentiment.

  • 2 March 2015

    Proofpoint acquires Emerging Threats to combat just that

    Proofpoint has inked another deal – its largest yet. Highly automated and cloud-friendly Emerging Threats will add to the acquirer's intelligence capabilities and boost its responsiveness to attacks. Proofpoint is paying $40m in cash and stock.

  • 23 February 2015

    To train or not to train - that is the question

    Because users are out on the proverbial frontline, many security professionals have debated the role they have to play in the information security battle. As attackers target users, how effective is it to invest in user education?

  • 11 February 2015

    Bit9 continues to bet on (Carbon) Black

    Bit9 + Carbon Black released Carbon Black 5.0, now with continuous recording and enhanced live response. While the code bases remain separate, we consider the combination of Bit9 and Carbon Black on an endpoint to be one of the most comprehensive in the anti-malware space.

  • 11 February 2015

    The Smell of Security, the Roar of the Cloud

    When buzzwords start getting thrown around with reckless abandon, the results can be polarizing. Vendor market figures only show half the picture. Our interviews shed light on how leading security products are bought, used and, in some cases, discarded.

  • 6 January 2015

    Good and sound Alert Logic found in Critical Watch acquisition

    The addition of Critical Watch will strengthen Alert Logic's technology considerably and has us pondering a future where MSSPs compete directly with non-managed products. Terms of the transaction were not disclosed.

  • 11 December 2014

    There is a traitor in our midst - exploring the insider-threat market

    When enterprises look at threats, considerable effort goes into detecting and preventing malicious software, but similar, if not larger, threats can arise from malicious humans. In this spotlight, we explore the insider-threat landscape and the relevant players.