Profile cover photo
Profile photo
Kim Lindros
38 followers
38 followers
About
Posts

Post has attachment
Are you thinking about investing in an endpoint detection and response (EDR) solution? Check out these pre-purchase questions before you buy.
Add a comment...

Post has attachment
The insider threat is one of the most dangerous risks facing organizations today. Find out how to prevent or deter damage from an insider threat using both no-tech and high-tech solutions.
Add a comment...

Post has attachment
Johannes Ullrich, SANS Institute, and David Britton, Experian VP, weigh in on IoT risks.
Add a comment...

Post has attachment
Are you in the market for an identity and access management solution? See "10 questions to ask IDaaS vendors before you buy" for tips from DocuSign and Box.com.
Add a comment...

Post has attachment

Just stumbled across this today. I always like Anton's posts! So good to read about threat intelligence without all of the thick corporate-ese.
Add a comment...

Post has attachment
Add a comment...

Post has attachment
Find out how IT operations analytics (ITOA) tools work and which features to focus on before buying.
Add a comment...

Post has attachment

Post has attachment

Post has attachment
See my latest article on CIO.com, with co-writer Ed Tittel.
Add a comment...
Wait while more posts are being loaded