API Security Part 2: Beyond the Basics – Giving Your Teams Better Peace of...

Having all the right controls in place, separating development concerns from segmentation and security, and opening access to reporting and monitoring tools all go...

Facebook, Cambridge Analytica, and the Need to Audit your API Management

If you run an open API program, the current controversy surrounding Cambridge Analytica’s use of Facebook data to create psychographic profiles of millions of...

Tibbr 7: Advances in Analytics, Communities, and Security for More Comprehensive Enterprise Collaboration

TIBCO just announced the release of tibbr 7, and we’re thrilled about how it’s improving the enterprise collaboration experience. From advanced and custom analytics...

Machine Data for Deeper Security Insights

Data breaches cost U.S. businesses an average of $5.4 million, according to the Ponemon Institute. Meanwhile, the 2014 Internet Security Threat Report reveals that more than 552 million...

Crack the Code to Secure File Sharing

In today’s world, data is collected about everyone. Whether it is installing cookies on your system when you search a web page, or viewing...

How Much are Data Breaches Costing You?

The average cost of a data breach in the United States is $188 per record, making the average organizational cost more than $5.4 million,...

IT Security: The Flak Jacket vs Blue Blankie Approach

Anyone who has considered making a big purchase has most likely heard the question “…and can you really put a price tag on that?”...

Is the Internet of Things a Gaping Security Chasm?

A couple weeks ago, Kashmir Hill wrote a pieces for Forbes about search engine Shodan, which was built for the purpose of crawling for devices on the Internet—many...

Effective Risk Management Sets Leaders Apart From Followers

“No risk, no reward; no guts, no glory.” In business, this mantra poses challenges, especially when dealing with compliance and security—companies need to take...
cyber security and data protection

Wars Between Nations are Being Fought on Computer Screens

National security has broadened in the last few years to extend beyond the physical borders of a country; it has entered the virtual sphere...