Blog Posts Tagged with "Legacy Systems"

582eecdede9f699fb750b90b0f13b5cf

Myth Busters: How to Securely Migrate to the Cloud

October 17, 2019 Added by:Bill Saltys

Security must remain a top priority for IT professionals during the migration process, and there is a successful pathway to safely and securely migrate to the cloud.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Ultra-Legacy Problem - Systems so old...

December 19, 2012 Added by:Rafal Los

Say you're a sizeable institution here and that over the last two decades you've amassed lots of platforms that run your business, in a time before the Information Security organization did much more than install anti-virus on your desktop... and now that technical debt has come back to haunt you...

Comments  (3)

4c1c5119b03285e3f64bd83a8f9dfeec

Cloud Migration: The Pain and the Opportunity

June 05, 2012 Added by:Ben Kepes

"Migrating to the cloud is not an easy process but good preparation goes a long way toward making it easier. Many businesses do not have their internal systems in good shape in the first place so migrating them to the cloud in bad condition must be horrendous"...

Comments  (0)

2e541940bc9b12ea62726bb51ed8787d

Firewalls: Stop Blocking by IP and Port

May 08, 2012 Added by:Phil Klassen

There has been some good discussions on firewalls, and the majority of the feedback is that firewalls are still an important part of the security infrastructure. However, I am surprised that the discussion revolves around legacy features and not those required to meet today's needs...

Comments  (3)

8a958994958cdf24f0dc051edfe29462

Smart Grid Security, Challenges and Change

May 08, 2012 Added by:Larry Karisny

The cost and time of trying to become compliant with guidelines and standards will put smart-grid security years off before it can achieve any security solutions. There must be a way out of what people in the security business are now calling the "smart grid security circus"...

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Are ICS Vendors Really to Blame for Insecure Systems?

April 27, 2012 Added by:Joe Weiss

The implication is that vendors aren’t interested in securing their legacy products. I do know that many ICS vendors supporting the electric industry are frustrated because the utilities may not be required to actually secure these systems to be NERC CIP compliant...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Evolution vs. Revolution in the Enterprise Mainframe

April 25, 2012 Added by:Bill Gerneglia

Mainframe technology can become dated quickly, and as application complexity increases, more space and increased mainframe functionality is required. If a mainframe fails to support advancing technology, application performance is put at stake...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

The Security Poverty Line and Junk Food

April 16, 2012 Added by:Wendy Nather

Organizations below the security poverty line tend to be inordinately dependent on third parties and have less direct control over the security of the systems they use. They end up ceding risk decisions to third parties that they ideally should be making themselves...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Shadow IT - Why Security is Scrambling to Reinvent Itself

April 16, 2012 Added by:Rafal Los

Shadow IT is the leading cause of many of the "reinventions" that IT organizations across the globe are going through. For many CIOs the ground is moving underneath their feet, and if they're not actively moving to counter it, there are some very serious consequences...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Understanding Cloud Security Part One

March 11, 2012 Added by:Neira Jones

The cloud provides an opportunity to re-architect older applications and infrastructure to meet or exceed modern security requirements. At other times, the risk of moving sensitive data and applications to an emerging infrastructure might exceed tolerance levels...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Supporting "Unmaintainable" Applications

May 08, 2011 Added by:Rafal Los

A solid Software Security Assurance program takes into consideration the legacy risks from all the applications that have existed before a security program came into being. The issues that surround legacy applications are complex, and can create headaches for security teams...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (016)

April 01, 2011 Added by:Christophe Veltsos

Who said: "We've approached security layer by layer. I have one tool for Web access, another tool for network access, another tool for e-mail. And yet I can't answer the basic question: Am I secure?"...

Comments  (0)