Enterprise Security

B689dd1362bef7eb372a540d3b6e6287

Preparing for a Successful IAM Integration Project (Part 1 of 2)

August 20, 2014 Added by:Identropy

If you have ever hired a Professional Services team to do an integration project, you know that it takes planning and tenacity to pull it through to the end. Depending on the breadth of the integration, the difficulty of accomplishing this varies.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Hackers Exploited Heartbleed Bug to Steal Patient Data from Community Health Systems

August 19, 2014 Added by:Mike Lennon

TrustedSec, citing sources familiar with the incident, said on Tuesday that the initial attack vector was through the infamous “Heartbleed” vulnerability in OpenSSL which provided the attackers a way in, eventually resulting in the compromise of patient data.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Getting in Our Own Way

August 18, 2014 Added by:Rafal Los

The security community has this widely-understood reputation for self-destruction. This is not to say that other communities of professionals don't have this issue, but I don't know if the negative impact potential is as great.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Why Your Enterprise Most Likely Doesn't Have a Zero-Day Problem

August 11, 2014 Added by:Rafal Los

It should by now be clear if you're a security professional that the average enterprise struggles with even the most basic security hygiene.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

“Stop The Pain” Thinking vs the Use Case Thinking

August 07, 2014 Added by:Anton Chuvakin

As I’ve written many times, SIEM is a “force multiplier”, but this definition implies that you have something to multiply. If you have 0 capabilities, a purchase of a SIEM tool will still leave you at – you guessed it!—0.

Comments  (0)

1b061b1cec6b5898e5326992d9461610

Infosec Monogamy

August 05, 2014 Added by:Dave Shackleford

As someone who consults in large organizations, as well as runs training classes for infosec, I’ve long pondered what the right mix is to help people gain the broadest, most applicable knowledge and experience in the shortest amount of time.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Back to BlackBerry: Frustrated Mobile Users Reject BYOD for the Former Market Leader

August 05, 2014 Added by:Patrick Oliver Graf

Thanks to what some say are restrictive Bring-Your-Own-Device (BYOD) and remote access policies, some mobile devices users in the corporate world are rebelling against BYOD – specifically, they don’t want their personal mobile devices to be controlled by their employer’s IT administrators.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Security is Action…Privacy is the Result of Action

August 04, 2014 Added by:Rebecca Herold

Information security and privacy have a lot of overlaps, but they ultimately involve different actions and different goals, and require those performing them to be able to take different perspectives.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Is it Cheaper to Keep it? Reevaluating Your IAM Solutions

July 31, 2014 Added by:Identropy

The most difficult hurdle to get over can be coming to terms with the fact that the selected solution is not delivering the expected value and deciding to move forward in search of a new solution.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Ad Hoc Security's Surprisingly Negative Residual Effect

July 29, 2014 Added by:Rafal Los

Security is fraught with the ad-hoc approach. Some would argue that the very nature of what we do in the Information Security industry necessitates a level of ad-hoc-ness and that to try and get away from it entirely is foolish.

Comments  (0)

B742830daed9314883a0edc63daefc42

EBS Encryption: Enhancing the Amazon Web Services Offering with Key Management

July 23, 2014 Added by:Gilad Parann-Nissany

Full disk encryption is becoming more and more popular in cloud settings, and some of the smaller clouds like Google Compute Engine have supported it for a while. Amazon is a bit late to this game, and should lead the way in enabling customer control of encryption keys.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

The Five Stages of Vulnerability Management

July 21, 2014 Added by:Tripwire Inc

The key to having a good information security program within your organization is having a good vulnerability management program.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security: Not Just a Checkbox Anymore

July 15, 2014 Added by:Tripwire Inc

There have been many publicized victims of breaches recently. There can often be a lot of conjecture as to what happened, how it happened, and why it happened.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Why No Security Analytics Market?

July 10, 2014 Added by:Anton Chuvakin

So, occasionally I get this call from somebody (vendor, end-user, investor, etc) inquiring about“the size of the security analytics market.” They are usually shocked at our answer: since there is no such market, there is no size to report.

Comments  (0)

4e9404278ec48b9cce4fcfa8ca048c29

Defense in Depth for Advanced Threat Protection

July 09, 2014 Added by:Alain Mayer

I believe that defense in depth – a long-established information assurance concept – can help in developing a sensible strategy for the evolving threat landscape.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Detecting and Preventing Advanced Persistent Threats

July 08, 2014 Added by:InfosecIsland News

Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »