article thumbnail

New Tech Spotlight: Security Technology Takes Center Stage

Forrester IT

Venture capital and private equity spending on security technology reached an all-time high in 2018. While that total may pale in comparison to other fast-growing markets such as fintech ($124B) or transportation tech ($150B), consider that 65% of that $31B in security has […].

Security 321
article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

A User Activity Monitoring (UAM) tool is a software solution designed to track and record the activities and interactions of users on computers or networks for security, compliance, or management purposes. UAM tools also greatly help ensure data security. UAM systems operate by installing a software agent on each employee's computer.

Tools 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Experts Assess 2.0 Draft of NIST Cybersecurity Framework

SecureWorld News

The addition of the 'implementation examples' are an extremely useful tool for organizations to actually implement the security controls they choose. Defending and Investigating Advanced Intrusions on Secure Email Gateways" at SecureWorld Dallas on Oct. Nader Zaveri – Sr. 8 (day 1 of the 2-day conference).

article thumbnail

Public Cloud IaaS : A Price/Performance vs. Security Analysis

Cloud Musings

What seems surprising, however, is that this shift is happening even in the face of repeated cautions and warnings about the security of public clouds. I''ve used this data to produce the Price/Performance vs Security chart below. Click to enlarge. Thank you.

Analysis 131
article thumbnail

Cognitio’s Roger Hockenberry Cited in BizTechReports

CTOvision

In the aftermath of high-profile data breaches at Sony, Target and Home Depot, chief information officers (CIOs), chief information security officers (CISOs) and other IT security professionals both in government and the private sector are playing from behind. . Our goal is always to help a company understand that risk.

article thumbnail

‘The Everything War’: Inside Amazon with author and Wall Street Journal reporter Dana Mattioli

GeekWire

.’ “ Amazon’s response: “We do not condone the misuse of proprietary confidential information, and thoroughly investigate any reports of employees doing so and take action, which may include termination. We have strict policies in place and keeping proprietary information secure is embedded into how the team operates.”

Journal 102
article thumbnail

Cognitive on Cloud

Cloud Musings

This shift to cognitive computing will occur within the next 12 to 14 months for many organizations and cognitive era success requires data centric management culture, a common requisite for secure cloud computing. Companies that are leveraging cloud today must also prepare for the cognitive computing era.

Cloud 70