Next week marks the start of ISC West 2017 under the neon lights of the Vegas Strip. Verint will join approximately 1,000 exhibitors and over 20,000 attendees—gathered to talk about the latest innovations and trends in the security industry.  The message of convergence continues to dominate the ...
Despite our best efforts, cyber attacks are getting more aggressive and sophisticated. The threat of targeted attacks is real, and the cyber security landscape must change with the need for greater vigilance. Today leading analysts are encouraging organizations to deploy solutions that go beyond ...
By now, the concept of the cyber attack chain—or kill chain—is widely accepted as a way to understand and deal with threats. The first thing that malware does once it’s established on the network is call home—reach out to a Command and Control (C&C) server. C&Cs are famous for controlling botnets, ...
Aware of the dangers and probability of suffering a data breach, organizations are rethinking their security posture. They realize that the traditional prevention-based security model, based on signature-based perimeter tools, is no longer effective against advanced cyber threats. To avoid being ...
We are pleased to announce that Kevin Wine, Vice President of Marketing for Verint Video and Situation Intelligence, and Matt Tengwall, Vice President and General Manager of Security and Cyber Solutions for Banking and Retail Markets for Verint, are nominees for the 2016 Physical Security Industry ...
There has been a lot of discussion lately about the cyber skills shortage. No question our industry must do more to provide education about cyber security and to encourage more students to launch down this path. But in the meantime, there is much that can be done to help improve efficiency and ...
Despite the fact that companies invest $92 billion annually on cyber security, 80% of organizations are still breached. Just recently, highly publicized breaches at Acer, Cisco’s GotoMyPC, and Calgary University suggest that on the whole, our approach to cyber defense is fundamentally flawed. And ...
What does this alert mean? Why is it important? What should I do? Our main takeaway from Infosec London 2016: Cyber security professionals are overloaded with information. And what they really want and need is answers. In the panel discussions, leading CISOs explained the difficulty they experience ...
Catching and investigating cyber attacks feels a bit like detective work. And whenever I think of detectives, one of my favorites comes to mind: Sherlock Holmes. The Sherlock Holmes stories are always a fun read as well as a great mental workout.  I’m always fascinated by the way Sherlock Holmes ...
As major data breaches to leading enterprises continue to make headline news, there is a rising awareness of the need to protect sensitive business assets from cyber attacks. Once considered a technical issue to be handled by the IT team, cyber threats are now considered a clear and present ...
All you need to do is open a magazine, turn on the news or walk the floor of an industry tradeshow to know that the security landscape is changing.  In previous years security was limited to the protection of physical assets and people—but that is no longer the case.  A convergence is underway that ...

Subscribe to Email Updates

Posts by Topic