Skip to main content
Return to Lancope.com
Inside the Threat
Inside the C-suite
Inside Security Ops
Inside our Products
Inside the Lab
Inside the Toolkit
Achieve High Availability with Lancope’s UDP Director™
Apr 01, 2015
In a world where network disruptions can equate to thousands of dollars in lost revenue and man hours, ensuring your network is running optimally is...
Know Your Enemy: the Motivations and Methods of the Insider Threat
Mar 31, 2015
Most of the cyberattacks that have made news headlines over the past year have been the result of outsiders successfully penetrating a company’s...
Department of Veterans Affairs Prioritizes Cybersecurity Efforts
Mar 25, 2015
In a recent briefing, Stephen Warren, CIO for the Department of Veterans Affairs (VA), reviewed the agency’s $4.1 billion budget proposal for IT...
From IR to CR: Enabling Continuous Response
Mar 23, 2015
Angela Frechette Cannon
As colossal data breaches are announced on a weekly basis, many organizations are asking themselves how to avoid becoming the next victim. Oftentimes...
The Anthem and Premera Data Breaches Put the Healthcare Industry on Notice: You are a Target
Mar 20, 2015
Recent headlines have put the healthcare industry in the spotlight, and have many asking if current security best practices are enough. But this is...
Ignore Insider Threats at Your Own Peril
Mar 17, 2015
After a string of high profile, headline-grabbing cyberattacks against some of the world’s most recognizable and trusted brands, you can be excused...
Monitoring High-Risk Users with StealthWatch Dashboards
Mar 13, 2015
Most businesses trust their own employees, but when an organization deals with sensitive data, security must come first. In such an environment, a...
Public-Private Collaborations on Cybersecurity Recurring Theme at White House Summit on Cybersecurity and Consumer Protection
Mar 12, 2015
A common sentiment shared during the White House Summit on Cybersecurity and Consumer Protection event last month was the importance of public and...
Protecting Healthcare Records from Cyber Attackers is a Game of Cat and Mouse
Mar 10, 2015
The never-ending battle between healthcare organizations and cyber attackers has always been like a game of cat and mouse. The hacker plays the role...
Don’t Stretch SIEM Beyond its Capabilities for Contextual Security Analytics
Mar 04, 2015
Jody Ma Kissling
Security information and event management (SIEM) tools have been a staple in the cybersecurity industry for many years now. However, the evolution of...
Michael Daniel Discusses the Current State of Cybersecurity and Need for Context Aware Security Data
Mar 03, 2015
2014 has been affectionately labeled as “the year of the hack” thanks to a number of very high-profile cases that made worldwide headlines. If CIOs...
Feb 20, 2015
Recent InfoSec news continues to show the relentless attacks against academic networks. This problem is not new, however. In 1999, Dr. John Copeland...