Remove Big data Remove Blog Remove Cybersecurity Remove Technology
article thumbnail

Data-Centric Security and Big Data

Thales Cloud Protection & Licensing

As Cybersecurity continues to be heavily focused on solving the problem of attacks against software vulnerabilities and system access, one potential silver bullet in the data breach equation remains out of the limelight. The Big Data Conundrum. Perhaps, it should.

article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

In this blog post, I’ll discuss: Our current perimeter defense; The need to shift to a data-centric security approach; and, The need to educate the public to strengthen our critical infrastructure security posture. Perimeter defense, while necessary, is not enough to protect our sensitive data. Perimeter Defense.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Assessing the risks involved in using the latest technology is something our culture had to adopt in the early days of the computer. New technologies come with risks — there’s no denying that. military officials hired data analysts to crack the Japanese secret code known as JN-25. After the devastating blow of Pearl Harbor, U.S.

article thumbnail

Why you really need trust and influence in cybersecurity

Jane Frankland

Over the next decade we'll see advancements in technology that will radically transform the way we work, live, and interact. New innovations in technology will bring us new found freedoms, empowerment, and unification. In my next blog, I’ll be examining trust in more detail. social capital) is growing.

article thumbnail

Anomali Appoints Chris Peterson as Vice President of Global Channel and Technology Partnerships

CyberSecurity Insiders

.–( BUSINESS WIRE )– Anomali , the leader in intelligence-driven extended detection and response (XDR) cybersecurity solutions, today announced that Chris Peterson has been named Vice President of Global Channel and Technology Partnerships. Blog: [link]. Twitter: [link]. LinkedIn: [link]. About Anomali.

article thumbnail

GUEST ESSAY: The case for acknowledging — and bridging — the security gap between IT vs OT

The Last Watchdog

My many years working with companies dealing with significant disruptions in the cybersecurity space has taught me a lot. Related: Biden cybersecurity order makes an impact. It is important to realize that IT/OT convergence is just as much about the human element as it is about technology. Crossing the Chasm.

IoT 190
article thumbnail

GUEST ESSAY: Here’s why managed security services — MSS and MSSP — are catching on

The Last Watchdog

The unification revolution of cybersecurity solutions has started – and managed security service providers are leading the way. Managed security services (MSS) refer to a service model that enable the monitoring and managing of security technologies, systems, or even software-as-a-service (SaaS) products. Fully-managed vs. co-managed.

Marketing 247