August 03, 2017
Veritas analytics adds Integrated Classification Engine to find sensitive private data that can help organizations comply with the looming General Data Protection Regulation.
July 31, 2017
Growing use of artificial intelligence tools by businesses was the focal point of analytics and data management trends predicted by a group of IT consultants and vendor execs.
July 26, 2017
The UK ICO hardly ever issues fines for data leaks and when it does, the fine involved is rarely anywhere near the maximum it could be.
July 25, 2017
Data engineering departments and their corresponding software application development shops have got the message regarding the upcoming General Data Protection Regulation (GDPR) by now, right? ...
GDPR Get Started
Bring yourself up to speed with our introductory content
In this video, Progress' Sumit Sarkar details the challenges his company faced with data lake implementation and enumerates security best practices associated with a data lake. Continue Reading
The General Data Protection Regulation is set to affect many, and not just those in the EU. If your organization collects data online, you may soon have to make some tough choices. Continue Reading
Security leadership abilities are hard to quantify. Certifications and degrees may ease the way into a career in cybersecurity, but hard-won experience is usually the surer path into a role that can influence meaningful change in today's complex environments. Whether they report into the CIO or outside of the IT organization, CISOs handle growing levels of responsibilities as evolving threats and infrastructures mean higher risk and no room for staff shortages. In this Information Security issue on cybersecurity careers, we look at the path to CISO. What are the measures of success or failure in this positon? Is it worth it?
As more Fortune 5000 companies seek CISOs to handle cybersecurity concerns, larger organizations in financial services and defense industries have piqued everyone's interest with their continued investment in the human factor -- the je ne sais quoi that results in successful threat hunting. While many definitions of hunting can be found, threat hunters essentially search for the traces attackers leave behind in an IT environment, usually before any alerts of their activities are generated by security devices.
"I used to think that only the best security operations center people could be threat hunters, but that's not always true," said Anton Chuvakin, a Gartner research vice president. "The best SOC analyst may be good at responding to alerts, but they don't always have the creativity that's needed."
As automation and machine learning gain hold, technology is still no substitute for security leadership abilities and cybersecurity talent. In this issue of Information Security magazine, we look at cybersecurity careers and the best ways to build top-notch security organizations.Continue Reading
Evaluate GDPR Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Nexsan's Gary Watson explains that the GDPR right to be forgotten will be an important piece of the compliance picture and means deleting data securely, completely and provably when customers ask for it. Continue Reading
IoT can be a strong component to ensure compliance with privacy regulations, creating a contextual perimeter for your data and your organization. Continue Reading
Learn to apply best practices and optimize your operations.
Organizations that are integrating IoT into their business should equally prepare for a deep digital transformation in their cyber and compliance practices. Continue Reading
Maintaining information privacy and security seem to be separate challenges, but in reality, each is integral to the other. Expert Kevin Beaver explains how to work toward both. Continue Reading
Companies selling to 27 European Union nations must monitor how the GDPR will affect marketing, as the EU creates new guidelines for CRM use of customer data. Continue Reading
Problem Solve GDPR Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Data management teams are asking more questions about data security, Gartner analyst Merv Adrian says in a Q&A. But new factors are complicating the process of securing databases, he adds. Continue Reading