by Shlom | Jun 12, 2017 | Uncategorized
The success of BI is in some ways its undoing. Such is the increasing demand that BI teams are struggling under an avalanche of unmet BI needs. In an effort to lighten the load, many are ’embracing a self-service mantra.’ Those in anticipation of a quick...
by Shlom | Jun 12, 2017 | Uncategorized
There are a number of guidelines to follow when it comes to protecting your data. Questions on how best to achieve this often include examples like “which data should be classified as sensitive?” and “which groups of users should have access to this data?” In fact,...
by Shlom | Jun 12, 2017 | Uncategorized
As networks continue to grow in size, so invariably does the number of endpoints grow – all of this makes endpoint threat detection more difficult than ever. At the same time, so too does detecting them become ever more important. As such, a very reasonable question –...
by Shlom | Jun 12, 2017 | Uncategorized
Almost every day there is news of yet another security breach. Yet still too many organizations assume they are immune from attack because they practice their own ‘good hygiene’ when it comes to internal security. Time and time again, however, companies...
by Shlom | Jun 12, 2017 | Uncategorized
Those of us in the world of cybersecurity are facing increasingly dynamic threats from profit-driven and sophisticated cybercriminals. We are now living in a world where attacks are driven, more and more, by well-funded organized crime as well as nation states. Given...
by Shlom | Jun 12, 2017 | Uncategorized
Typically, the method of dealing with SQL injection attacks is to install a firewall in learning mode and train it to recognize attacks. This is far from perfect, but until now it’s been the only way. However, there are now claims that this has been solved with...