• eBook: Cyber Security is the Board’s Business

    Board members have a fiduciary responsibility to establish and govern business policies and practices that drive a company’s financial performance and growth. But do they have a comprehensive view of the company’s defense posture to assure they are a conscientious steward of the business?

    In this eBook, Board members will discover why they need to be concerned about cyber security and how to get more involved.
  • The 2016 Insider Threat Study: Current State of Enterprise Data Security

    The 2016 Insider Threat Study: Current State of Enterprise Data Security surveyed IT executives on their top concerns regarding data security and insider threats. 72% of respondents said “careless users” are their highest worry for data breaches while 39% are concerned about malicious users. Addressing the risk of insider threats is a priority, and respondents said lack of user behavior monitoring and poor visibility across products and vendors hamper detection. Download the study to get the full breakdown of the results and learn how organizations are addressing insider threats.
  • Cyber Security Board Oversight: Taking Ownership of Cyber Security Risks

    Enterprise-level cyber security solutions require more than just technology and employee training; they require the top-down involvement of everyone within the organization, including the Board of Directors. Getting buy-in from a Board of Directors is not always easy, however.

    In this eBook, CEOs and CIOs will discover new ways to educate their Board of Directors and get them onboard with their cyber security.
  • Combat today’s threats with a single platform for app and data security

    Read Combat Today’s Threats with a Single Platform for App and Data Security and learn how to protect web applications and sensitive data across the enterprise and in the cloud. Employing a practical approach, this paper guides you through four simple steps to discover, assess, protect and monitor access to sensitive data.
  • Top 10 Indicators of Data Abuse

    The threat from insiders is not a new phenomenon, but high-profile incidents have elevated enterprise focus on effective detection and mitigation of insider threats. Detecting insider threats is challenging because internal users have legitimate access to valuable information, making it difficult to discern between appropriate data access and a true insider threat incident. In this playbook, we examine the top 10 indicators of data abuse based on real world scenarios collected from live production data in several enterprise environments.
  • Interview with Executive Allan Tessler: Corporate Directors Must Be Involved in Cyber Security

    A corporate board needs to be responsible for ensuring that an organization’s intellectual assets as well as customer information are protected. Customer data is one of the primary sets of information that needs to be safeguarded from hacking and invasion because of the potential mal-use of that information. Read this short Q&A to learn why it’s important for corporate directors to understand cyber security risks.
  • Advanced Persistent Threat - Are You the Next Target?

    Security researchers have been talking about advanced persistent threat (APT) for some time. Recently, we have seen a steep increase in the number of organizations hit by this type of attack. Initially, researchers thought APTs were mostly aimed at government agencies or political targets, but the latest attacks on enterprises suggest that APTs are not confined to a specific type of organization or sector.