Subscribe to RSS Feed grab our rss feed

Entries Tagged ‘security intelligence’

Webcast: What to Look for in an Effective Cyber Detection & Response Solution

Despite our best efforts, cyber attacks are getting more aggressive and sophisticated. The threat of targeted attacks is real, and the cyber security landscape must change with the need for greater vigilance. Today leading analysts are encouraging organizations to deploy solutions that go beyond the traditional defenses of siloed products, such as firewalls and antivirus […]

read more...

Detecting Command & Control Communications—Context Is Key

By now, the concept of the cyber attack chain—or kill chain—is widely accepted as a way to understand and deal with threats. The first thing that malware does once it’s established on the network is call home—reach out to a Command and Control (C&C) server. C&Cs are famous for controlling botnets, but they are essential […]

read more...

Revealing the Long-Term Costs of Building an Advanced Cyber SOC

Aware of the dangers and probability of suffering a data breach, organizations are rethinking their security posture. They realize that the traditional prevention-based security model, based on signature-based perimeter tools, is no longer effective against advanced cyber threats. To avoid being the next victim of a high-profile data breach, organizations are seeking advanced and post-breach […]

read more...

Communication and Collaboration Key To Keeping Us Safe in an Unsafe World

The recent tragedy at The Pulse nightclub added an extra dimension to the Association of Public Safety Officials (APCO) Annual Conference and Expo in Orlando, Florida this week. More than 2,500 registered attendees are here with just under 300 exhibiting companies. APCO is the premier industry event for public safety communicators and has been since […]

read more...

Align the Attack/Defense Mismatch Part 2: Address the Shortage of Cyber Skills and Resources

There has been a lot of discussion lately about the cyber skills shortage. No question our industry must do more to provide education about cyber security and to encourage more students to launch down this path. But in the meantime, there is much that can be done to help improve efficiency and alleviate the shortage […]

read more...

Align the Attack/Defense Mismatch Part 1: Make Security Teams More Productive

Despite the fact that companies invest $92 billion annually on cyber security, 80% of organizations are still breached. Just recently, highly publicized breaches at Acer, Cisco’s GotoMyPC, and Calgary University suggest that on the whole, our approach to cyber defense is fundamentally flawed. And the worst part is—today’s sophisticated attackers know exactly what these flaws […]

read more...

Engage 2016—A Highlights Roundup from This Week’s Verint Global Customer Conference

Numerous customer and partner activities continued this week in Chicago during the Verint Engage 2016 Global Customer Conference at the Hilton Chicago. Click here for a look back at how the event opened. After an action-packed start, attendees moved into day three by kicking off the morning with industry roundtable breakfast sessions and two dynamic keynote […]

read more...

Customers Gather for Engage 2016 Global Customer Conference

The 2016 Engage Global Customer Conference in Chicago is underway! We’re delighted to welcome users of solutions and services from Verint as well as the latest additions to our family of companies—Telligent and Contact Solutions. More than 1,200 attendees from around the world have gathered at the Hilton Chicago on magnificent Michigan Avenue—representing over 15 […]

read more...

How Vulnerable is Your Brand?

Terms such as ATM skimming, identity theft, data breaches, scams, kiting, and phishing are becoming all too prevalent in today’s society. In just the last five years we’ve seen large, well-known retail and financial services organizations attacked by hackers and other nefarious individuals looking to steal personal information, transactional data or even funds from those […]

read more...

Convergence: The Big Pivot for Financial Security

All you need to do is open a magazine, turn on the news or walk the floor of an industry tradeshow to know that the security landscape is changing.  In previous years security was limited to the protection of physical assets and people—but that is no longer the case.  A convergence is underway that will […]

read more...