20 May, 2016
Gartner annually recognizes a select number of Cool Vendors in key technology areas through a series of research reports that highlight their innovative approaches to...
4 May, 2016
Why despite SOC and IR team effort and time spent on analyzing suspicious SIEM events and flashy UBA dashboards, trying to detect hacker and malicious...
17 Apr, 2016
Many security companies today claim they have the holy grail of security big data – they have the ability to boil all security data points...
17 Feb, 2016
Well, Think Again… Five years ago, database encryption was regarded as the holy grail of data security.
2 Feb, 2016
I invented DDM 8 years ago as a feature to my database technology. Since then, I have implemented DDM in dozens of the global banks,...
5 Jan, 2016
WHY DO YOU BUY SECURITY SOLUTIONS THAT ONLY PROTECT YOU FROM HACKERS OR ONLY FROM MALICIOUS INSIDERS?
21 Dec, 2015
The year 2015 was no different – more successful attacks by hackers and malicious insiders. In years past, what was once considered an “advanced” attack...
10 Dec, 2015
In a nutshell, SIEM collects network signals, DLP detected malware, and application logs. Therefore, adding User Behavior Analytics to existing solutions that only rely on...