insider threat

insider threat news search results

Developer news items we found relating to insider threat

12 results
Ransomware-prevention-platform-ProLion-sees-large-increase-in-revenue

Ransomware prevention platform ProLion sees large increase in revenue


Monday, October 24, 2022 by

ProLion has recorded an 80 percent increase in revenue for FY2022, driven by the addition of over 250 new customers worldwide. The uplift has been driven by demand for its ransomware protection solution CryptoSpike, which has soared as a result of the rise in ransomware and ransomware-as-a-service attacks. The company also reported a renewal rate of 89...


Red-Hat-OpenShift-now-available-for-IBM-and-LinuxONE

Red Hat OpenShift now available for IBM and LinuxONE


Tuesday, February 18, 2020 by

Red Hat OpenShift Container Platform is generally available for IBM Z® and IBM LinuxONE™. “Containers are the next generation of software-defined compute that enterprises will leverage to accelerate their digital transformation initiatives,” says Gary Chen, Research Director at IDC. “IDC estimates that 71% of organizations are in the proce...


Data-Privacy-Day-2020-is-here

Data Privacy Day 2020 is here


Tuesday, January 28, 2020 by

Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure. Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...


Container-security-considerations-for-developers

Container security considerations for developers


Monday, October 29, 2018 by

On the path to a secure digital business, secure service containers bring the best of agility and security to development teams – a growing concern for companies from startups to the Fortune 500. By moving the security concern out of the application layer into an encompassing container platform, one provides a very elegant solution to significantly reduced attack ...


Dataguise-recognized-in-MarketsandMarkets-datacentric-security-report

Dataguise recognized in MarketsandMarkets datacentric security report


Thursday, January 25, 2018 by

Dataguise was cited a new report titled Data-Centric Security Market Global Forecast to 2022 published by IT research firm MarketsandMarkets. In the report, analysts forecast the global data-centric security market to grow from USD $1.79 Billion in 2016 to USD $5.83 Billion by 2022, at a compound annual growth rate (CAGR) of 23.1%. The report indicates that sensitive da...


Over-90-percent-of-healthcare-IT-networks-have-IoT-devices-connected

Over 90 percent of healthcare IT networks have IoT devices connected


Thursday, July 20, 2017 by

ZingBox has released the results of its survey of IT decision-makers within the healthcare industry. The survey, fielded in early July, found that the majority of healthcare IT networks have IoT devices and that most IT departments believe that existing security solutions for laptops and servers can also protect connected medical devices.More than 90% of healthcare IT n...


Metadata-can-be-deadly-in-cyber-exploitation

Metadata can be deadly in cyber exploitation


Tuesday, July 18, 2017 by

When someone says "There's no cause for concern, it's only metadata" you can send them this:Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data po...


The-data-security-money-pit

The data security money pit


Wednesday, January 25, 2017 by

93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...


CA-Identity-Suite-now-includes-integration-with-CA-Privileged-Access-Manager

CA Identity Suite now includes integration with CA Privileged Access Manager


Thursday, December 1, 2016 by

CA Technologies has announced a new release of CA Identity Suite that includes integration with CA Privileged Access Manager for governance of privileged accounts and new, flexible deployment options for agility, speed and ease-of-use in identity management and access governance helping to save time and save money. Privileged User Governance Helps Mitigate Insider ...


MarkLogic-9-NoSQL-Database-Released-in-Preview

MarkLogic 9 NoSQL Database Released in Preview


Friday, May 13, 2016 by

MarkLogic has released MarkLogic 9 in preview, offering updates to the NoSQL database for integrating data from silos. MarkLogic is optimized for structured and unstructured data providing the ability allowing to store, manage, query and search across JSON, XML, RDF, geospatial data, text, and large binaries.New features in MarkLogic 9 include:Data Integration: MarkLogi...


Guidelines-to-Identify-and-Protect-Against-Internal-Network-Security-Threats

Guidelines to Identify and Protect Against Internal Network Security Threats


Friday, February 19, 2016 by

APCON, a provider of intelligent network monitoring solutions, has published a new guide to identify and protect against internal network security threats. The publication, “Safeguarding Your Network from Insider Threats,” highlights the impact of data breaches and internal threats, which despite receiving less public attention, can be just as dangerous and damaging as ...


What-You-Need-to-Know-about-BYOD-Security

What You Need to Know about BYOD Security


Wednesday, December 2, 2015 by

As employees bring their own devices to work, IT teams face an assortment of challenges, from managing mobile apps on a myriad of different devices to backing up and restoring business data. But bar none, the greatest burden for IT staff is securing business data on mobile devices.The Good, the Bad, and the Ugly (in Reverse Order)The UglyThe BYOD phenomenon has spawned ...