Technology

6d117b57d55f63febe392e40a478011f

Michael Santarcangelo on the Value Imperative Mindset in Security

July 12, 2013 Added by:Anthony M. Freed

To better understand how we as security professionals can hone our messaging across the organization and up the corporate food chain to elicit the responses we are seeking, we recently spoke at length with Michael Santarcangelo of Security Catalyst, widely recognized in the security field as an effective communicator and catalyst for change and improvement.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Subtleties of Enterprise Security Vulnerability Management — at Scale

July 11, 2013 Added by:Rafal Los

Enterprises face some interesting challenges as they grow. Once you scale to any real size, tasks that seemed simple become unmanageable and difficult, even confused. One of those tasks is vulnerability management, and while it may sound simple and trivial, I assure you it is, indeed, not.

Comments  (1)

D2c1e74cac8f12e965acd1a21fef3a38

Mitigate Security Risk Before Your Business Collapses

July 11, 2013 Added by:Jan Valcke

Security is not an optional feature to be implemented after the horse has bolted. Lack of security may have severe consequences and can result in destructed corporate image, severe revenue losses and liability suits. Strong authentication alleviates a lot of security concerns and can help build customer trust, credibility and can even become a competitive advantage.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Addressing the Open Doors in Your APT Strategy

July 10, 2013 Added by:InfosecIsland News

With APTs leveraging these weaknesses, it’s critical to have visibility and control of enterprise key and certificate inventories. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot respond quickly. We need to gain control over trust; we need to plug the gap related to key & certificate-based exploits. (Re...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Wanna Be a Security Rock Star? Practice Like One…

July 06, 2013 Added by:Tripwire Inc

When was the last time you rehearsed your security script? Are you comfortable with your tools? If you want to be a security rock star, you should practice like one.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security Intelligence for the Enterprise - Part 2

July 02, 2013 Added by:Rafal Los

Very few companies are actively using security intelligence for better defense. What gives? This post will describe for you what I believe it means to extract value from security intelligence. And more important, why I believe three out of four enterprises are still failing to get that value.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

What is Enough Security?

July 01, 2013 Added by:Jarno Limnéll

Enough security is not the same thing as absolute security. Absolute security does not exist. Thus, striving for an illusion hardly supports anyone’s core business.

Comments  (0)

B44a73900ca3197c2d8f148e303b3faa

FAQ: Why Are You So Negative About the State of the Security Industry

July 01, 2013 Added by:Brad Bemis

Why are you always so negative about the state of the security industry and how we're fairing in the information protection game?

Comments  (0)

798062984af63011823d48fef7863cd8

What to do When Traditional Security Isn’t Enough

June 25, 2013 Added by:Paul Lipman

Relying on traditional security measures to catch the bad guy in action or prevent being the victim of a breach doesn’t cut it in today’s threat landscape, and IT teams don’t have the time and resources to address each threat vector in isolation, nor should they have to.

Comments  (1)

369dec31d888693bba6b6e0f39c14ce3

Healthcare Interrupted - Top Five Vulnerabilities Hackers Can Use Right Now To Shut Down Medical Devices

June 24, 2013 Added by:Matt Neely

By performing penetration tests on hospital networks and medical devices, security researchers have found that many commonly used devices are insecure and can be easily compromised.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Another Reason Hacking Back is Probably a Bad Idea

June 20, 2013 Added by:Rafal Los

Private industry and corporations alike are talking about “hack-back.” It’s no secret I believe that “hack-back” is a bad idea, for many reasons.

Comments  (3)

1488d8c03dfd3125db25b6aec94dcf92

Brand Damage Through Information Access

June 20, 2013 Added by:Eric Chiu

In a competitive business environment, reputation is a critical differentiator. Any company that suffers from a major data breach, instigated by an employee with a small grudge and big access, could face devastating consequences to the corporate brand, and to the bottom line.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

20 Critical Security Controls: Control 13 – Boundary Defense

June 18, 2013 Added by:Tripwire Inc

This post is all about Control 13 of the CSIS 20 Critical Security Controls – Boundary Defense. Here we explore the (29) requirements I’ve parsed out of the control.

Comments  (0)

890b3a52d134186c048e1d845daae070

From the SMB to Security Guru: Five Ways IT Pros Can Manage Security on a Budget

June 14, 2013 Added by:Vinod Mohan

Given the expanding threat landscape for the SMB and the increased demand for affordable IT security tools, here are five valuable tips for IT pros that help shed light on managing enterprise security on a budget.

Comments  (0)

1de705dde1cf97450678321cd77853d9

Scangate Re-visited: Vulnerability Scanners Uncovered

June 12, 2013 Added by:Ian Tibble

The notion that VA tools really can be used to give a decent picture of vulnerability is still heavily embedded, and that notion in itself presents a serious vulnerability for businesses.

Comments  (0)

5c549756b3c0b3d5c743158a72ce3809

Identity Management: The First Step in Protecting from the Inside Out

June 07, 2013 Added by:Michael Fornal

Identity Management applications are slowly gaining speed in the security realm as an important tool in managing provisions of an applications or to aid in gaining a handle on compliance and identity governance.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »