article thumbnail

Best Practices to Pass an IT Security Audit

Data Breach Today

Josh Hankins of Qualys on Tips and Tricks He Learned as a Practitioner Before he became a chief technical security officer at Qualys, Josh Hankins was a cybersecurity leader in financial services. He learned how security audit failures are increasingly costly, and he devised new strategies for audit preparation.

Security 147
article thumbnail

French Security Firm Says Hackers Accessed Its Source Code

Data Breach Today

Stormshield Is a Major Supplier of Security Products to the French Government French security vendor Stormshield has launched an investigation after an internal review found that hackers accessed the source code of the company's network security product.

Security 363
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Boosting Security Resilience and Defending the IT Ecosystem

Data Breach Today

Jeetu Patel of Cisco Discusses the Critical Ability to 'Bounce Back' From Incidents With rising threats facing critical infrastructure sectors, such as healthcare and financial services, "society as a whole, and the safety of society is completely dependent on cyber risk" - and being security resilient, says Jeetu Patel of Cisco.

Security 245
article thumbnail

Assessing the Privacy, Security Risks of Digital Health IT

Data Breach Today

A new assessment framework aims to help patients, healthcare providers and others examine the various privacy, security and other risks of digital health technologies, says Tim Andrews of the nonprofit Organization for the Review of Care and Health Applications, which co-developed the framework.

Privacy 240
article thumbnail

The Essential Guide to Building Analytic Applications

What should software teams know about implementing security that works with the rest of their products? What should product managers keep in mind when adding an analytics project to their roadmap?

article thumbnail

Honeywell's James DeLuccia on Product Security vs IT Defense

Data Breach Today

Consistency Is the Objective in IT Security, But Product Security Must Be Flexible Organizations expect the IT security landscape to be consistent - from builds and hardware to operating systems - but for product security, everything Honeywell makes is a snowflake with flexible, highly tailored design across many technologies, says Honeywell Product (..)

Security 147
article thumbnail

Shadow IT, SaaS Pose Security Liability for Enterprises

Dark Reading

Software written or acquired outside of IT's purview is software that IT can't evaluate for security or compliance.

Security 141
article thumbnail

5 Early Indicators Your Embedded Analytics Will Fail

Many application teams leave embedded analytics to languish until something—an unhappy customer, plummeting revenue, a spike in customer churn—demands change. But by then, it may be too late. In this White Paper, Logi Analytics has identified 5 tell-tale signs your project is moving from “nice to have” to “needed yesterday.".

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter.

article thumbnail

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cyber security threats. As technology leaders, it's time to rethink some of your product security strategy. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

And despite your SaaS adoption offering many positives, there is now an exponential increase in IT, security, and business complexity. By focusing on SaaS security posture management, your team can finally accomplish the following: Discover both known and unknown SaaS apps. So, you’ve accomplished an organization-wide SaaS adoption.

article thumbnail

The Business Cost of Phishing

IT and Security teams will tell you that they’re spending too much time and money on phishing, but what does that mean? Phishing is a problem that's plagued organizations for years. This report quantifies the financial impacts of phishing.

article thumbnail

Recovering from a Cyber Attack

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

If your organization stores data and is connected to the Internet, it is not a matter of “if” a cyber-security incident will happen, but “when.” It takes an organizational mindset which realizes that data privacy and security is a continuous, evolving process, as opposed to a “fire-and-forget” set of steps.