The dynamic evolution of financial fraud creates new opportunities for defensive strategies that employ big data and analytics. Terry Austin of Guardian Analytics discusses new threats and solutions.
Data-centric security: It's a shift from securing where data resides to securing the data itself. Matt Pauker of Voltage Security tells how this approach helps organizations improve their security posture.
IBM, Lockheed Martin and Fixmo are among the organizations to issue product/solution news releases in advance of RSA Conference 2013. See the latest announcements for the show.
Mobile security, advanced persistent threat and DDoS attacks on banks have been among the hottest security stories. How have they influenced RSA Conference 2013? Program Chair Hugh Thompson previews the event.
Intrusion detection is challenging for most organizations, and hackers' ever-increasing skill to evade monitoring tools only compounds the problem. But Zions Bank's Michael Fowkes says big data can help.
Organizations typically secure data where it resides and is transmitted. Data-centric security strategies focus on securing the data itself. Mark Bower of Voltage Security explains.
Managing advanced persistent threats will be a priority throughout 2013, says RSA CISO Eddie Schwartz. How should organizations defend themselves against APTs and the year's other top security threats?
ENISA, the European Union cyber-agency, is out with its first-ever Threat Landscape report. What are the emerging threats and vulnerabilities, and how should organizations globally respond to them?
An evolving concept known as "intelligent security" involves using a combination of technologies to detect threats, helping security professionals become more proactive. Learn how pioneers are using the new approach.
CISOs' top three priorities for 2013 are emerging threats, technology trends and filling security gaps, says RSA CISO Eddie Schwartz. But what new strategies should leaders employ to tackle these challenges?
There are two kinds of threats to organizations: The known threats detected by your security infrastructure, and the unknown threats, which only emerge as abnormal patterns in system data. How can security leaders protect themselves from both types of threats?
Register for this session to learn more about big data...
To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?
The massive growth of data within today's enterprise overwhelms traditional security controls. How can organizations inventory, manage and secure Big Data at every stage of its lifecycle? How can they turn the security challenge into a security advantage? Join this panel of experts for a discussion of Big Data and...
With the increasing amount of data being collected by organizations, the role of the data scientist has emerged to aid in analysis. What's unique about the role and what job functions does it entail?
Banks have a lot of data, but how well is it integrated? How much are institutions gleaning from the data they house? State Street Corp's chief scientist says financial services could be doing more.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.