Should We Trust Good-Guy Hackers?
Businesses test for network vulnerabilities in many different ways and the public’s opinion of good-guy hackers greatly depends on the companies that hire them.
Businesses test for network vulnerabilities in many different ways and the public’s opinion of good-guy hackers greatly depends on the companies that hire them.
The digital world has become a dangerous place. It’s like the Wild West (the movie kind, not the real kind, which was decidedly less wild than it’s portrayed), with outlaws out to do you harm and make off with your precious data. Fortunately, like any good western, there are also honour-bound gun slingers seeking to bring law, order and – most importantly – security to the digital landscape.
Using Machine Learning to Save Businesses Time and Money as They Comply with the New EU Regulation
The most hyped law on data protection has finally come into effect on May 25, 2018. Passed by the European Parliament on April 14, 2016, it is already being touted as the most stringent data protection law across the world. Prior to GDPR, Data Protection Directive of 1995 was applicable which now stands repealed. Apart from the businesses incorporated in the European Union, GDPR also applies to businesses incorporate outside the European Union but are dealing with the data of EU residents.
In the evolving world of technology, cybersecurity threats are growing exponentially and, therefore, enterprises are seeking for standardized and automated Security Operation Centers (SOCs) to address these threats effectively. Though SOC standardization and Automation is of paramount importance, yet there are some other critical factors that must be considered when building an effective and reliable SOC.
We regularly introduce new features to USM Anywhere and USM Central to help your team to be more effective at detecting and responding to threats. You can keep up with our regular product releases by reading the release notes in the AlienVault Product Forum. Here are a few of the highlights from our May 2018 releases.
It's been a busy month for the CyberRisk product team! We're proud of this release, and can't wait to share the details with you. All these new features are immediately available to CyberRisk customers.
If you’re involved in IT risk or security, you’ve probably encountered BitSight. It is one of a wave of promised solutions to a growing problem: how to manage the risks posed by your IT vendors in the cloud. The legacy approach to solving this problem is a combination of spreadsheet-based vendor assessments, sporadic penetration tests and vulnerability scans. If you combine this with subjective measurement and scoring of risk, you are probably taking on a lot more risk than you should.
If you haven’t done so recently, visit the Egnyte App Store. We’ve spruced up the user interface just in time for Spring (Northern Hemisphere). Now that there are hundreds of apps working with Egnyte, we offer new tools to help you find what you’re looking for faster.
There’s much talk about the General Data Privacy Regulation (GDPR) taking effect on May 25 and its impact on US companies with European operations. As more and more information has been collected electronically over the years, it’s become necessary to mandate that companies better protect this information from being breached. With this mandate, the days of collecting and storing personal information are gone.