Industries

21 08, 2015

Through the Looking Glass: Why security researchers are stirring up the industry

By | August 21st, 2015|Cybersecurity|Comments Off on Through the Looking Glass: Why security researchers are stirring up the industry on Through the Looking Glass: Why security researchers are stirring up the industry

What do the DOJ, Apple, and Oracle have in common? Confusion over what to do with independent security researchers.
18 08, 2015

Life after Breach: 5 steps to recover from a cyber attack

By | August 18th, 2015|Cybersecurity|Comments Off on Life after Breach: 5 steps to recover from a cyber attack on Life after Breach: 5 steps to recover from a cyber attack

Christina Kubecka’s Black Hat briefing on recovering from the Aramco cyber attack lays out a playbook for post-attack recovery and adaptive security teams.
11 08, 2015

Bringing Security into View: Visualization at Black Hat 2015

By | August 11th, 2015|Cybersecurity|Comments Off on Bringing Security into View: Visualization at Black Hat 2015 on Bringing Security into View: Visualization at Black Hat 2015

Visual models combining data science and machine learning are the future for rapid-response cyber security.
30 06, 2015

Why Hackers Pick on Healthcare

By | June 30th, 2015|Healthcare|Comments Off on Why Hackers Pick on Healthcare on Why Hackers Pick on Healthcare

Data breaches abound. The healthcare industry has been the go-to choice for hackers due to poor security practices, vulnerable medical devices, and the lucrative credentials in patient records.
19 06, 2015

OPM Hack Exposes Bleak Reality of National IT Security and Advanced Threat It Faces

By | June 19th, 2015|Cybersecurity, Vulnerability & Threat Management|Comments Off on OPM Hack Exposes Bleak Reality of National IT Security and Advanced Threat It Faces on OPM Hack Exposes Bleak Reality of National IT Security and Advanced Threat It Faces

Accusations fly at China, but basic weaknesses in OPM security practices and shortcomings of DHS’s Einstein hold most of the blame for recent breach
30 04, 2014

Hertfordshire County Council Talks Risk Analytics and Security at Infosecurity Europe

By | April 30th, 2014|Industries, Visibility & Intelligence|0 Comments on Hertfordshire County Council Talks Risk Analytics and Security at Infosecurity Europe

Hertfordshire County Council to share how risk analytics have changed the way they think about network security and vulnerabilities. No longer tied to manual analysis, the security team can focus on the big picture – reducing risk.
28 04, 2014

Intelligence as a Service: The Future of Frontline Security

By | April 28th, 2014|Cybersecurity|0 Comments on Intelligence as a Service: The Future of Frontline Security

SecureData will present “Intelligence as a Service,” which uses Skybox Security’s risk analytics platform to assess risk, prioritize and remediates vulnerabilities, detect threats, and provide context-aware remediation that’s real-time and actionable.