WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Integra
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
None | June 05, 2014
According to the Information Security Forum’s Transitioning from Alignment to Integration report, which will be released to ISF Members this week, CISOs need to understand the information security context: where the function is currently in terms of skills, capabilities and capacity, and how it is perceived within the organization. This step is necessary as organizations must perceive the information security function to be a center of excellence if it is to integrate into the business&rsq...
None | April 17, 2014
“Revelations about how governments had been surrendering commercial and personal privacy in the name of national security – compounded by a number of major economic and technical developments – have left citizens trust badly shaken,” said Steve Durbin, ISF's global VP, in an interview with Infosecurity. “The outcome? Organizations are quickly coming to the realization that what they have trusted and taken for granted for so long, must now be completely re-assess...
Security Week | June 26, 2017
At Cisco Live, Las Vegas Monday, IT analytics firm Corvil announced the integration of its Security Analytics with the Cisco Tetration Analytics platform. The intention is to combine Corvil's realtime packet-level analysis with Tetration's vast big data repository of downstream application-level data flows to provide an early, rich, granular and consistent detection of anomalous communications indicative of compromise. Tetration was launched by Cisco in June 2016. It was described as &qu...
Dark Reading | March 20, 2018
Aggregating threat intel from external data sources is no longer enough. You must look inside and outside your traditional knowledge base for the best way to defend against attacks. Early last year in "Grizzly Steppe and Carbanak: The Dangers of Miscalculation in Cyberspace," TruSTAR researchers outlined the overlap of tactics, techniques, and procedures (TTP) between Russian state organizations and criminal organizations like the Carbanak hacking group. We found that Carbanak and atta...
PLATFORM SECURITY
Article
ENTERPRISE SECURITY
DATA SECURITY
Whitepaper
Video
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE