Categories
The year 2015 was no different – more successful attacks by hackers and malicious insiders. In years past, what was once considered an “advanced” attack...
In a nutshell, SIEM collects network signals, DLP detected malware, and application logs. Therefore, adding User Behavior Analytics to existing solutions that only rely on...

Subscribe to Blog
Stay up to date on our latest blog and news content
Thanks!
Keep an eye on that inbox for the latest news and industry updates.
Alon Rosenthal A few years ago, I invented Dynamic Data Masking. I used an SQL proxy that could apply SQL rewrite in real-time in order...
Alon Rosenthal I invented Dynamic Masking and sold my first company to Informatica before I was 40. I made out well and was reaping the...
This summer’s Ashley Madison hack was one heard around the world due to the notorious nature of the business. Unfortunately, these hacks are becoming far...
Adam Kalish I’ve been working with CISOs of Fortune 1000 for the last 10 years, and one fact was always apparent – they are responsible...