GDPR

Navigating GDPR in the mobile enterprise

Securing data and protecting privacy in a connected world is already a major challenge for any enterprise, and mobility only magnifies this challenge. Mobile devices are …

clock

The real cost of alarm fatigue

One of the toughest challenges for an IT security team is managing and sifting through the deluge of security alerts that are created on a daily basis. Teams can waste …

Sqrrl

Getting a start on cyber threat hunting

In this age of advanced persistent threats, waiting for traditional threat management solutions like IDS and SIEM to flag incidents and threats is simply not enough anymore. …

world

Living in an Assume Breach world

Some security professionals claim their networks are secure from hacking. They may say this to justify a recent large purchase of security equipment. But many times, they say …