Self Service Shortcut is No Miracle

Self Service Shortcut is No Miracle

The success of BI is in some ways its undoing. Such is the increasing demand that BI teams are struggling under an avalanche of unmet BI needs. In an effort to lighten the load, many are ’embracing a self-service mantra.’ Those in anticipation of a quick...
Best Method Securing Data

Best Method Securing Data

There are a number of guidelines to follow when it comes to protecting your data. Questions on how best to achieve this often include examples like “which data should be classified as sensitive?” and “which groups of users should have access to this data?” In fact,...
Endpoint Threats

Endpoint Threats

As networks continue to grow in size, so invariably does the number of endpoints grow – all of this makes endpoint threat detection more difficult than ever. At the same time, so too does detecting them become ever more important. As such, a very reasonable question –...
Security Questions for Vendors

Security Questions for Vendors

Almost every day there is news of yet another security breach. Yet still too many organizations assume they are immune from attack because they practice their own ‘good hygiene’ when it comes to internal security. Time and time again, however, companies...
Risk Based Security

Risk Based Security

Those of us in the world of cybersecurity are facing increasingly dynamic threats from profit-driven and sophisticated cybercriminals. We are now living in a world where attacks are driven, more and more, by well-funded organized crime as well as nation states. Given...
RASP Approach

RASP Approach

Typically, the method of dealing with SQL injection attacks is to install a firewall in learning mode and train it to recognize attacks. This is far from perfect, but until now it’s been the only way. However, there are now claims that this has been solved with...