Security News

High-Tech Bridge launched ImmuniWeb Discovery AI to conduct the threat-aware risk assessment and inventory of websites and web applications. Insecure and outdated web applications are a core...

Carbon Black's Matt Bennet Shares Insights on Making Big Data MeaningfulBig data holds the key to moving from a preventive security stance to a more predictive stance, says Matthew Bennett of Carbon Black.

History Has Proven That Data Often Gets Lost, Stolen, MisusedNumerous technology firms now offer facial biometrics recognition search tools for big data sets. But information security expert Alan...

Cloud Forensics, Fraud, Extortion and Cyber Sociology Dominate Edinburgh EventWhat are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in...

We need to democratize threat intelligence data, says IBM Security Vice President Caleb Barlow.

There are more connected devices than people on the planet, says IBM Security Vice President Caleb Barlow. We have to shift our thinking now about how we manage device security.

Data can prevent cyber-attacks by rolling out new models to stop imminent threats, and by quickly testing controls against historical data to ensure minimal business impact, says MapR's John Omernik.

Stu Bradley of SAS on Taking the Right StepsWhat are the key elements of leveraging big data for analytics? Stu Bradley of SAS provides an overview of the essential steps.

When companies partner with vendors for big data analysis, they must be prepared for the consequences.

Here’s an overview of some of last week’s most interesting news and articles: Malicious activity surges coincide with geopolitical events 2017 was a year of multiple geopolitical events that...