Please turn on your JavaScript for this page to function normally.
APTs: The fine balance of control and monitoring

Security is not about winning the war. It is more like insurance, it’s about how we handle risks. In order to successfully handle the risk of Advanced Persistent Threats …

Puzzle
Classification and protection of unstructured data

In this podcast recorded at RSA Conference 2015, Stephane Charbonneau, CTO of TITUS, talks about TITUS Classification Suite 4, a significant new release of its flagship data …

The importance of data loss prevention for OS X

Apple products have increasingly gained popularity in enterprise environments due to perception that they are so secure they will never get attacked and no data will be …

The risks of moving data into cloud and mobile environments

In this podcast recorded at RSA Conference 2015, Rich Campagna, VP, Products & Marketing at Bitglass, talks about how cloud and mobile and the the largest trends …

Securing the smart grid: European Network of Cyber Security

Dr. Klaus Kursawe is the Chief Scientist at the European Network of Cyber Security (ENCS), where he is leading the research and development activities for critical …

Social threat intelligence

There’s been an explosion of companies that realized threat intelligence was the next frontier. In this podcast recorded at RSA Conference 2015, Trevor Welsh, Sales …

Qualys Web Application Firewall
Product spotlight: Qualys Web Application Firewall 2.0

In this podcast recorded at RSA Conference 2015, Wolfgang Kandek, CTO at Qualys, talks about the recently announced Qualys Web Application Firewall (WAF) version 2.0, that …

CTO insights: Defending your organization from insider attacks

If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received …

Infosec: Don’t fear the word

Are these words too difficult for you? Basilisk, snuffleupagus, supercalifragilisticexpialidocious, Quidditch, Oompa Loompa. I hope not! They’re all part of the magical world …

The importance of integrating identity and data

In this podcast recorded at RSA Conference 2015, Siva Belasamy, CEO and CTO at Deep Identity, talks about how identifying who has access to what, and the risks associated with …

Emerging trends and targeted threat intelligence

In this podcast recorded at RSA Conference 2015, Court Little, Director of Product Management at Solutionary, talks about how the bar is being raised across the entire …

Protecting and identifying your information assets

In this podcast recorded at RSA Conference 2015, Tim Upton, CEO at TITUS, illustrates how TITUS gives your data an identity by adding metadata to an information asset such as …

Don't miss

Cybersecurity news