Secure Thinking

Showing articles in "Cybersecurity".
Back to all articles

A Championship Performance: ICA Thwarts Unseen Data Loss in Cyber-security Title Tilt

Redemption.  Remember that word? The University of North Carolina claimed it back in 2017, and we thought we would share it with our ACC brethren Virginia this year after they got knocked out in the first-round last season (OK, so, that wasn’t really the plan here in Chapel Hill, but…). This year’s overtime thriller will […]

The Road to the Cyber-security Threat16 Final Four Stops Here!

An exciting first week of the NCAA tournament yielded a pretty compelling set of regional finals as down went Duke [my personal favorite as a UNC fan]. Now, let’s hope that both the real world and cyber-security Final Four showdowns are just as impressive! In the cybersecurity #Threat16 virtual tourney, the match-ups also lived up […]

More Cyber-security Madness – See Who Advanced in the #Threat16 !!!

Madness struck again this weekend as both top basketball and cyber-security seeds fell and underdogs reigned victorious. For starters, Auburn, or should we say AubRUN, took the number one ranked Tar Heels by surprise, demolishing them Friday night (admittedly this is where my loyalties reside). And, over in the #Threat16 we also had a weekend […]

A Cybersecurity Bracket Buster – Meet the “Threat16”

We’re a full week into the 2019 NCAA tournament which means March Madness is well underway and brackets are already being busted as we head toward the Sweet 16. Here at Bay Dynamics, we’re taking a creative, cybersecurity-driven spin on this year’s tournament: welcome to the #Threat16. In fact, we believe that the hype of […]

Customer Success – Global Payments Leader Optimizes DLP with Integrated Analytics

It’s no secret that there’s a massive cybersecurity skills gap. This has been reported for many years and recent reports indicate there’s no sign of it slowing. In fact, the 2018 Cybersecurity Workforce Guide published by (ISC)² contends that the gap actually continues to widen. The report estimated that the shortage of cybersecurity professionals reached […]

Customer Success – Global Media and Telecom Provider Transforms DLP Strategy with Analytics

February is now upon us but 2019 is still young and presents an opportunity for departments from the SOC to the boardroom to review existing tools and processes to determine any gaps – or to identify resources that may need to be retired to make room for something new. In so doing, security teams will […]

And the winner is: Bay Dynamics for User Behavior Analytics Platform of the Year!

We are pleased to announce that Bay Dynamics has been named the winner of the “User Behavior Analytics Platform of the Year” award for the second consecutive year from CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies and products in the global information security market today. This recognition is further validation of the […]

Winners vs. noise: The must-knows when investing in the newest cybersecurity hotspot

Finding the right company to invest in is difficult, and there are many investors already waiting around the hoop creating, even more, competition. So how do you pick through the noise and find the winners in the user entity behavior analytics market? Here are three things you should keep in mind.

Taking the right angle on security visibility

Visibility is the name of the game when it comes to measuring an organization’s risk posture. For effective cyber risk management, it’s essential for CISOs to have the right visibility in order to understand what employees, strategic business partners, and third-party vendors are doing on the inside and how they are interacting with high-valuable assets. […]

Telling the Board What They Want to Hear Instead of What They Need to Hear

By Feris Rifai, CEO and co-founder, Bay Dynamics Whether security is a major concern or a differentiator for an organization, depends highly on how it is managed. More importantly, how a company’s security stance is reported and how the board leverages those security insights is central to discerning whether security controls are a benefit or […]

To download this document, please fill out the form below:

×
* Indicates required fields
I am interested in a product demonstration or trial
Please send me emails regarding product updates and availability