This white paper provides a cutting-edge view on why large organizations can no longer rely on preventive security systems, point-security tools, manual processes and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous...
The future of security lies in using data for behavioral analysis of both people and systems. How else do we determine what's normal from what's not? To do so, security teams must apply big data solutions and thinking to level the playing field between attacker and defender.
Join this session for expert insight...
The National Institutes of Health is tackling security challenges as it rolls out many "big data" research endeavors involving human genomes and other sensitive data. Research director Eric Green describes the issues.
The health advocacy group Genetic Alliance on April 5 will unveil a registry designed to enable patients to control how health information is shared with researchers. Spokesman Greg Biggers discusses privacy measures.
Solutionary is out with its 2013 Global Threat Intelligence Report. What are the top four threats to organizations, and how can they be mitigated? Security strategist Don Gray offers insights and tips.
Most organizations have more data than they know what to do with, much less understand how they can use that data in a meaningful way, say NopSec's Lisa Xu and Steven Leonard. Having the ability to aggregate that data is key.
Data-centric security: It's a shift from securing where data resides to securing the data itself. Matt Pauker of Voltage Security tells how this approach helps organizations improve their security posture.