Should I Use “SIEM X” or “MSSP Y”?

December 18, 2014 Added by:Anton Chuvakin

Lately I’ve been surprised by some organizational decision-making as they think about their sourcing choices for security monitoring.

Comments  (0)


5 Effective Ways to Raise Privacy Awareness

December 18, 2014 Added by:Rebecca Herold

Here are five of the ways that I’ve found to be very effective for raising privacy awareness throughout the years.

Comments  (0)


Debunking The Biggest Cyber Security Myths for Businesses

December 16, 2014 Added by:Tripwire Inc

A glimpse at the world of cyber security can be a frightening one. Stories revolving around security breaches hitting major companies, like Target and Home Depot, can fill any business executive with trepidation.

Comments  (1)


How To Exit an MSSP Relationship?

December 15, 2014 Added by:Anton Chuvakin

Let me touch a painful question: when to leave your managed security services provider?

Comments  (0)


The 3 Necessary Elements for Effective Information Security Management

December 15, 2014 Added by:Rebecca Herold

In addition to many really huge organizations, I’ve worked with hundreds of small to midsize businesses over the years. I’ve seen a large portion of the small to midsize organizations completely omitting not just one, but two and in many situations all three of these core elements.

Comments  (0)


How to Successfully Fast Track a Software Implementation Before 2015

December 08, 2014 Added by:Tripwire Inc

In order to succeed, it is important to fast-track a successful plan based on establishing a solid foundation of people, process and planning.

Comments  (0)


Security in 2015: The Internet Becomes the Corporate Network Perimeter

December 05, 2014 Added by:Paul Lipman

The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...

Comments  (0)


The Cost of a Data Breach in 2014: An Industry by Industry Breakdown

December 04, 2014 Added by:Thu Pham

The average total cost of a data breach increased 15 percent in 2014 to $3.5 million, this according to the Ponemon Institute’s 2014 Cost of Data Breach Study: Global Analysis. But how does that average vary from industry to industry, each with different types of consumer information and different data regulations?

Comments  (0)


Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (1)


DLP Without DLP!?

December 03, 2014 Added by:Anton Chuvakin

As we are updating GTP DLP research, I think I noticed a disturbing trend – organizations planning what is essentially a data loss prevention project without utilizing DLP technology.

Comments  (0)


The Security Industry and a Look Ahead

December 03, 2014 Added by:Art Coviello

I am cautiously optimistic about the prospects for collaboration and collective progress in the private sector as companies and industries are recognizing that in the digital world, no one is an island. We’re more like an archipelago and we’re starting to build bridges.

Comments  (0)


The Three Human Failures Behind Remote Access Shortcomings

November 26, 2014 Added by:Patrick Oliver Graf

Whenever news of a network security breach reaches the public airwaves, observers are quick to assign blame to some combination of technological shortcomings and human error that allowed an attacker to slip through the victim’s cyber defenses.

Comments  (2)


Data Classification for a Stronger Security Outlook

November 26, 2014 Added by:Steve Martino

While data must be protected, not all data is of equal importance and therefore not in need of the same level of protection. Security teams should consider the types of data that exist within their organizations and what security measures will work best for each.

Comments  (1)


Security or Checking a Box?

November 20, 2014 Added by:PCI Guru

What is your organization interested in? Security or checking a box? Not surprisingly, most people answer “security” and then go on to prove with their actions and words that they are only interested in checking a box.

Comments  (1)


Access Governance 101: Job Changes and Elevated Permissions

November 20, 2014 Added by:Identropy

Depending on the functionality and importance of your applications, databases and document folders, access should be reviewed periodically to ensure your organization is secure.

Comments  (1)


MSSP Client Onboarding – A Critical Process!

November 17, 2014 Added by:Anton Chuvakin

Many MSSP relationships are doomed at the on-boarding stage when the organization first becomes a customer.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »