article thumbnail

10 projects top of mind for IT leaders today

CIO Business Intelligence

The CIO position has morphed since its inception 40 years ago, shifting from a nuts-and-bolts techie job to an increasingly business- and strategy-focused executive role. Those projects include implementing cloud-based security, anti-ransomware, and user behavior analytics tools, as well as various authentication technologies.

IT 133
article thumbnail

Database Activity Monitoring – A Security Investment That Pays Off

Smart Data Collective

Does DAM need a user behavior analytics (UBA) module? Do database activity monitoring systems need user behavior analytics features? By and large, you need to build an entire data protection strategy. How can database activity monitoring (DAM) tools help avoid these threats? This article will provide the answers.

article thumbnail

The FireEye Attack and 4 Security Moves to Make Right Now

CDW Research Hub

Look for unusual activity on your network using either a user and entity behavior analytics (UEBA) solution or a network detection and response (NDR) or endpoint detection and response (EDR) tool that has been updated to look for indicators of compromise (IoCs) from the FireEye attack. Long-term strategies.