Blog Posts Tagged with "Automation"

Bd07d58f0d31d48d3764821d109bf165

Finishing the Security Automation Job

September 06, 2012 Added by:Tripwire Inc

SACM needs to grow upward and outward from where the SCAP efforts have gotten – move from controls into control frameworks and support the policies, processes, and procedures derived from Operational Risk Management. We’ve got a lot of work ahead. It’s all worth it...

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

Information Security, Hackers, and Vigilance

July 30, 2012 Added by:Tripwire Inc

The bottom line: Attackers are always looking for mistakes, outliers, and inconsistencies so they can use them against you. This means your security programs need to be robust, resilient, measurable, and – as much as possible – consistent (vs. ad hoc)...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Morphing Network Assets to Restrict Adversarial Reconnaissance

July 18, 2012 Added by:Headlines

"The intent of cyber maneuver is to place computer network defense technology into a proactive state, thereby shifting the advantage away from the attacker. By constantly changing the characteristics of the networks it resides on, MOPRHINATOR provides a more robust and trusted networking solution..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Resilient Enterprise: Resolving Issues Faster

July 03, 2012 Added by:Rafal Los

How can we both restore service quickly and solve a long-term systemic problems when we can't always tell that two issues are even related? Optimize the analysis between changes, connected systems and components to figure out dependencies in cases such as linked and distributed failures...

Comments  (0)

1de705dde1cf97450678321cd77853d9

The Perils Of Automation In Vulnerability Assessment

June 25, 2012 Added by:Ian Tibble

“Run a scanner by it” still appears in so many articles – it's still very much part of the furniture. Software suites are built on the use of automated unauthenticated scanning – in some cases taking an open source scanning engine, wrapping a nice GUI around it, and slapping a 25K USD price tag on it...

Comments  (5)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Resilient Enterprise: Taming Chaos with Automation

June 20, 2012 Added by:Rafal Los

Whatever the incident or failure, the system can detect and respond in an automated fashion as long as its within the realm of known things. When things fail or break in a new way that has never been seen before, the system will take corrective action to restore service to the best of its ability...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

On the New Generation of P2P Botnets

June 18, 2012 Added by:Plagiarist Paganini

"Every peer in the botnet can act as a C&C server, while none of them really are one. Bots are now capable of downloading commands, configuration files, and executable from other bots -- every compromised computer is capable of providing data to the other bots..."

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cloud Patch Management: Consistency and Automation

May 23, 2012 Added by:Rafal Los

If you've chosen wisely, you environments across your public and private clouds are consistent. The big question is - how do we keep our environments consistent in the face of security requirements to push patches? The answers rely very heavily on automation and policy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Developing Self-Defending Networks

May 15, 2012 Added by:Headlines

"This is a game-changing idea in cybersecurity.... we are currently losing against online attackers. In order to fundamentally change the cybersecurity landscape and reduce that high risk we need some big, fundamental changes to the way computers and networks are constructed..."

Comments  (0)

099757b145caa6965ea51494adbc25ba

The Importance of Mobile Device Management for Enterprise Security

May 13, 2012 Added by:Drayton Graham

Almost everyone has their own mobile phone these days, nd they are quickly becoming a necessity in business. In order to enable the kind of freedom BYOD brings, the corporate network and data needs to be protected. Mobile Device Management is a solution that will help with this...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud: Making the Security Case

May 05, 2012 Added by:Rafal Los

When we think about cloud computing we can think of security as getting a bit of a gentle push, or shove in some cases. The way it is built and billed as services instead of individual components, and the increased emphasis on automation - security has a real chance of not being a roadblock...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

In Fifty Gigabytes, Turn Left: Data-Driven Security

March 08, 2012 Added by:Wendy Nather

If you break security events down, you're generally looking for two things: normal activities that are being done by the wrong people, or abnormal activities being done by the right people. And by people I also mean systems, but it's sometimes hard to tell the difference...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Master the Cloud, Montréal - Notes from the Road Part 2

February 01, 2012 Added by:Rafal Los

As clouds pop up, expand and workloads become mobile across virtualization platforms, federation will allow a much easier move from one provider and from one platform to another without having to worry about separate authentication, authorization, and validation efforts...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Malware Creation Hit Record High in 2011

January 31, 2012 Added by:Headlines

The report attributes the increase to automation techniques being more widely used in the creation of malware variants - slightly altered signatures developed to foil anti-malware detection software. The report notes a sharp increase in the proliferation of Trojans...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Government Can Save Millions Reforming Security Policy

December 30, 2011 Added by:Headlines

“The members all share the same belief that these inefficiencies can be greatly reduced. By taking action now we can conserve our resources and ensure our capacity for critical national security activities in the future...”

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Avoiding 7 Common Mistakes of IT Security Compliance

August 16, 2011 Added by:Sasha Nunke

Ambiguity abounds due to lack of a universal philosophy of compliance. A big challenge for security professionals is navigating this ambiguity, especially when financial auditing terms such as GRC are loosely applied to IT security solutions. Let the buyer beware...

Comments  (2)

Page « < 1 - 2 - 3 > »