5 Jan, 2016
WHY DO YOU BUY SECURITY SOLUTIONS THAT ONLY PROTECT YOU FROM HACKERS OR ONLY FROM MALICIOUS INSIDERS?
21 Dec, 2015
The year 2015 was no different – more successful attacks by hackers and malicious insiders. In years past, what was once considered an “advanced” attack...
10 Dec, 2015
In a nutshell, SIEM collects network signals, DLP detected malware, and application logs. Therefore, adding User Behavior Analytics to existing solutions that only rely on...
18 Nov, 2015
Alon Rosenthal A few years ago, I invented Dynamic Data Masking. I used an SQL proxy that could apply SQL rewrite in real-time in order...
15 Nov, 2015
Alon Rosenthal I invented Dynamic Masking and sold my first company to Informatica before I was 40. I made out well and was reaping the...
6 Oct, 2015
This summer’s Ashley Madison hack was one heard around the world due to the notorious nature of the business. Unfortunately, these hacks are becoming far...
6 Aug, 2015
Adam Kalish I’ve been working with CISOs of Fortune 1000 for the last 10 years, and one fact was always apparent – they are responsible...