A "zero trust" security model makes it easier to manage application access and protect against malicious users, but the rollout of the model must be managed in a very organized way, says Mani Sundaram, CIO and EVP, Global Services and Support, at Akamai Technologies.
As modernized data centers scale up and out,
there is a strong potential for growing complexity
as well. IT teams need to be vigilant in simplifying
architectures and operations as the technological
landscape changes.
While the potential of monitoring and analytics in your data center is huge, to take advantage,...
When considering data center security, you will
need to decide which security functions need to
be deployed and where you want to deploy them.
These functions are expected to be implemented
wherever a firewall is used.
Read our eGuide to find out which security functions to deploy, and where to deploy them,...
"We are at a phase where we are moving from information-centric security to behavioral-centric security," says Harshil Doshi, security strategist at Forcepoint.
Adaptive authentication, which looks for deviations in users' patterns of behavior, can play an important role in enhancing security, says Dilip Panjwani, CISO and IT Controller at Mumbai-based LTI.
Information about more than 14,000 HIV patients included in a Singapore health registry was exposed online in what appears to be an inside job. The incident illustrates the importance of safeguarding sensitive health data, such as by implementing behavioral analytics.
Hardware authentication and user behavior analytics are among top promising security technologies that Michael Prakhye, CISO at Adventist HealthCare, will closely examine in the year ahead.
As legacy security information management (SIM) technology becomes outdated and less effective, improved customization and flexibility will dictate which providers will lead the pack. Vendors that can provide customization, integrations, and data security position themselves to successfully deliver flexibility,...
Artificial intelligence and machine learning will have a significant impact on lowering the cost of securing an organization because it will reduce the need for advanced skillsets, predicts Rapid7's Richard Moseley.
Behavioral analytics have taken the fast lane from emerging tech to mature practice.
The key element that has made behavioral analytics move so fast and become something so important to security is that the focus has been not on the technology itself but on the value it provides the enterprise, notably when being...
Behavioral analytics have taken the fast lane from emerging tech to mature practice. And Mark McGovern of CA Technologies says the technology is being deployed in innovative ways to help detect insider threats.
Organizations are increasingly tapping behavioral analytics to help incident responders "correlate data from multiple sources and save time in the response workflow" - in other words, to more quickly detect and mitigate breaches, says Nick Bilogorskiy at Juniper Networks.
An unusual breach notification issued by health insurer Humana shows how some organizations are identifying anomalous behaviors of voice technology users to detect potential fraud.
At its core, compliance is about behavior. It's about whether your users utilize protected data sets in an appropriate manner. While most organizations focus on the establishing and assessment of the security controls around access, the true test of compliance revolves around having visibility into what users do with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.