8 May 2021
    0

    Security Champions – they can help put the “SEC” in DevSecOps

    What makes an Application Security Champion, how you identify them, what are their responsibilities, and what are the benefits of having a Security Champion program?
    by in Security
    7 May 2021
    0

    Is Your Personal Financial Data Safe?

    Through format-preserving encryption such as Voltage SecureData, organizations can keep the financial information secured within big data platforms, allowing the data opened to third party data analysts to remain protected. This approach ensures that customers can trust financial companies to keep their personal financial data safe from breaches.
    by in Security
    7 May 2021
    0

    Decoding Security AI Startups and Investments, featuring Dino Boukouris

    Dino Boukouris of Momentum Cyber joins us for the ongoing Humans and Machines Podcast, which looks at the ever-changing technology landscape by interviewing thought leaders in the data, security and Artificial Intelligence (AI) industries.
    by in Security
    4 May 2021
    0

    Discover Why SecureMail is the Logical Choice for End-to-End Email Security with a Free Trial

    Voltage SecureMail has been the choice of thousands of organizations because it provides end-to-end email encryption yet does not have the added complexity of keys or certificates.
    by in Security
    2 May 2021
    0

    The RSA Conference Teaches Resilience

    This last year the world needed to show resilience. We are proud to be back again at the RSA Security Conference in 2021, to show the InfoSec world our new and evolving security solutions and help orgs gain cyber resilience
    by in Security
    1 May 2021
    0

    In-depth analysis comes at a cost – so does a breach!

    With exploits through application vulnerabilities on the rise, less capable SAST tools are increasingly being used to try and identify these vulnerabilities and weaknesses, setting their organizations up for a potential breach by taking short cuts on thorough applications security testing during development.
    by in Security
    29 Apr 2021
    0

    Pluggable analytics to help SOCs evolve to detect threat actors

    Security analytics is playing a growing role in SOCs as a way of discovering unseen or hidden patterns through learnings from historical data. Analytics also brings to bear sophisticated, intelligence-driven tactics for real-time investigation of both known and unknown vulnerabilities, immediate access, evidence visualization, and additional advanced tools and practices that reduce the potential risk of cybersecurity…
    by in Security
    29 Apr 2021
    0

    Humans and Machines Episode Blog: GDPR and You, featuring Carole Piovesan

    The areas of law and artificial intelligence might feel like worlds that never connect, but that’s no longer true. In fact, growing concerns around data privacy, ethical and responsible AI, and data and model bias, have made the intersection of law and AI both incredibly important and increasingly relevant. That's why Carole Piovesan, who specializes in data governance, privacy law, cybersecurity and artificial intelligence…
    by in Security
    28 Apr 2021
    0

    ArcSight ESM Participates in MITRE Engenuity ATT&CK Evaluations

    Recently, 2021 MITRE Engenuity released the results from the 2020 ATT&CK Evaluations, in which ArcSight ESM was a first-time participant. Historically, this has been the domain of the Endpoint Detection and Response (EDR) products, however we are proud to be one of the first SecOps vendors to participate and show another point of view; how a pure-SIEM play could enhance EDR results, by providing additional visibility…
    by in Security
    28 Apr 2021
    0

    Dynamic Data Masking VS Dynamic Data un-Masking

    Although data masking, both static and dynamic, is becoming more widely accepted to safeguard sensitive data, the best way to ensure the protection of data privacy is Dynamic Data Unmasking.
    by in Security