While some security experts see endpoint detection and response suites, or EDRs, as the successor to endpoint protection platforms, or EPPs, both have a role to play in securing the enterprise.
Implementing EDRs is time-consuming and requires specialized skills. EDRs generate so much finely detailed technical data...
Critical infrastructure - energy, defense and transportation among the components - forms the backbone of a nation's economy, security and health. Hence, it is imperative to secure critical infrastructure elements, such as power grids, communication and finance.
State-sponsored attacks are gaining momentum and...
While encryption, data loss prevention and web filtering technologies will continue to be important, Cloud Access Security Brokers will play a critical role in improving cloud security.
CASB, which is a next-generation firewall, helps CISOs gain the necessary visibility, map risks and detect external and internal...
According to a recent Gartner report, Blockchain distributed ledger technology has reached the peak of its hype cycle and remains at the peak of inflated expectations. It offers enormous promise, but enterprises are unsure how to extract business value from it. The question all security and fraud practitioners across...
Payments technology changes rapidly, and cybercriminal techniques are having no trouble keeping pace. As the use of stolen data and fraudulent cards become more difficult, criminals are shifting their focus and innovating to access customer payment transaction data. The risk of data theft is very real. To stay ahead,...
Aadhaar - the largest biometric-based unique identification system in the world - holds the sensitive personal data of over 1.2 billion Indian citizens. With repositories of personal data held by both private companies and government, Aadhar has come under the lens for frequent data security lapses, and critics have...
As fraudsters continually refine their techniques to steal customers' credentials, organizations have found new ways to fight back with new tools that use behavioral biometrics and cognitive fraud detection.
It is critical to know how cognitive abilities would help in managing risks, compliance and governance as...
Resources and security controls deployed for early detection are turning out to be futile when it comes to dealing with today's emerging threats. This session details an effective approach to threat hunting, which includes response to advanced attacks. Threat hunting is emerging as a new line of defense and is the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.