Secureworks: Proactively fighting cybercrime with TIBCO LogLogic

Secureworks: Proactively fighting cybercrime with TIBCO LogLogic

One of the biggest issues with cyber threats and breaches is that the longer an incident persists, the costlier it can be....
TIBCO and Ping Identity Team Up to Deliver Advanced API Security to Customers

TIBCO and Ping Identity Team Up to Deliver Advanced API Security to Customers

TIBCO is excited to announce its new partnership with Ping Identity, a fellow Vista Equity Partners portfolio company. As partners, TIBCO and...

API Security Part 2: Beyond the Basics – Giving Your Teams Better Peace of...

Having all the right controls in place, separating development concerns from segmentation and security, and opening access to reporting and monitoring tools all go...

Facebook, Cambridge Analytica, and the Need to Audit your API Management

If you run an open API program, the current controversy surrounding Cambridge Analytica’s use of Facebook data to create psychographic profiles of millions of...

Tibbr 7: Advances in Analytics, Communities, and Security for More Comprehensive Enterprise Collaboration

TIBCO just announced the release of tibbr 7, and we’re thrilled about how it’s improving the enterprise collaboration experience. From advanced and custom analytics...

Machine Data for Deeper Security Insights

Data breaches cost U.S. businesses an average of $5.4 million, according to the Ponemon Institute. Meanwhile, the 2014 Internet Security Threat Report reveals that more than 552 million...

Crack the Code to Secure File Sharing

In today’s world, data is collected about everyone. Whether it is installing cookies on your system when you search a web page, or viewing...

How Much are Data Breaches Costing You?

The average cost of a data breach in the United States is $188 per record, making the average organizational cost more than $5.4 million,...

IT Security: The Flak Jacket vs Blue Blankie Approach

Anyone who has considered making a big purchase has most likely heard the question “…and can you really put a price tag on that?”...

Is the Internet of Things a Gaping Security Chasm?

A couple weeks ago, Kashmir Hill wrote a pieces for Forbes about search engine Shodan, which was built for the purpose of crawling for devices on the Internet—many...