Quantcast
Channel:
Browsing latest articles
Browse All 93 View Live

ObserveIT Honored by 2017 Cyber Defense Magazine Infosec Awards for “Most...

Cyber Defense Magazine, the industry’s leading electronic information security magazine and media partner of RSA® Conference 2017, has recognized ObserveIT’s expertise in User Behavior  Monitoring and...

View Article



GDPR Overview - Tips to Get Started

It's About TimeSome data security pundits are saying, “It’s about time.” Sure, becoming fully compliant with the European Union’s General Data Protection Regulation (EU GDPR) is going to be a big,...

View Article

Vault 7: WikiLeaks Reveals the Need for User Activity Monitoring & Analytics

WikiLeaks recently began a new series of leaks on the United States Central Intelligence Agency, codenamed Vault 7. It is the largest ever publication of confidential documents on the CIA—and,...

View Article

Image may be NSFW.
Clik here to view.

What is Metadata?

View Article

EU GDPR – Why It Matters and What It All Means

GDPR is “Disrupting” Privacy ExploitationThe EU GDPR (General Data Protection Regulation) represents the most significant change to data protection laws in the EU since 1995, aiming to unite data...

View Article


Website Categorization Explained

 This week's topic: Website Categorization  

View Article

Introducing ObserveIT 7.0

ObserveIT has released its next major version 7.0. The company’s mission has always been to identify & eliminate insider threat by focusing on what the user is doing vs what a system or a computer...

View Article

CERT: Insider Threat Resource

CERT Insider Threat Center (SEI Carnegie Mellon University)Insider Threat Tips is shifting gears this week focusing on a great insider threat resource, the CERT insider threat group.

View Article


EDR Compared to Insider Threat Monitoring and Analytics

What is EDR?

View Article


Executive Order 13800: Strengthening Cybersecurity of Federal Networks and...

Summary:Presidential Executive Order 13800 focuses on many key areas that are integral to building and maintaining a successful Insider Threat Program. Some of these critical components include...

View Article
Browsing latest articles
Browse All 93 View Live




Latest Images