DATA SECURITY, PLATFORM SECURITY

Cybersecurity Technologies for Cloud Access

September 14, 2022

Cybersecurity Technologies for Cloud Access
The enterprises’ network and network security architectures are unable to effectively serve the dynamic secure access requirements of digital business. The enterprise data center is no longer the center of access requirements for users and devices.

Spotlight

SpectorSoft

The SpectorSoft mission is to provide world-class software and support that enables our customers to protect their most valuable assets, reduce their risk, and gain unparalleled visibility into their operations. SpectorSoft is an innovator in actionable User Behavior Analytics and the global leader in User Activity Monitoring. More than 36,000 companies, schools, and government entities worldwide utilize SpectorSoft solutions to gain insight into the user activity on their network, and enjoy the security and productivity increases that come with it.

OTHER WHITEPAPERS
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

The State of Ransomware in Manufacturing and Production 2022

whitePaper | October 6, 2022

Sophos' annual study of the real-world ransomware experiences of IT professionals in the manufacturing and production sector has revealed an ever more challenging attack environment. Together with the growing financial and operational burden ransomware places on its victims, it also shines new light on the relationship between ransomware and cyber insurance - including how insurance drives changes to cyber defenses.

Read More
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More

Spotlight

SpectorSoft

The SpectorSoft mission is to provide world-class software and support that enables our customers to protect their most valuable assets, reduce their risk, and gain unparalleled visibility into their operations. SpectorSoft is an innovator in actionable User Behavior Analytics and the global leader in User Activity Monitoring. More than 36,000 companies, schools, and government entities worldwide utilize SpectorSoft solutions to gain insight into the user activity on their network, and enjoy the security and productivity increases that come with it.

Events