article thumbnail

The FireEye Attack and 4 Security Moves to Make Right Now

CDW Research Hub

Look for unusual activity on your network using either a user and entity behavior analytics (UEBA) solution or a network detection and response (NDR) or endpoint detection and response (EDR) tool that has been updated to look for indicators of compromise (IoCs) from the FireEye attack. Navigating the next steps.

article thumbnail

10 projects top of mind for IT leaders today

CIO Business Intelligence

Krishna Prasad, chief strategy officer and CIO at UST, a digital transformation solutions company, says that cybersecurity not only remains top of mind but an area of significant work for IT as it’s tasked with executing much of the risk-mitigation efforts. Risk management came in at No. Foundry / CIO.com 3. For Rev.io

IT 59
article thumbnail

Database Activity Monitoring – A Security Investment That Pays Off

Smart Data Collective

Does DAM need a user behavior analytics (UBA) module? Do database activity monitoring systems need user behavior analytics features? During this process, you need to analyze your data assets, categorize and prioritize them, conduct a risk assessment, and establish appropriate monitoring and response techniques.