Items Tagged with "Enterprise Security"


44fa7dab2a22dc03b6a1de4a35b7834a

Data Mobility and Security Biggest Cloud Computing Concern

September 10, 2012 Added by:Bill Gerneglia

BYOD issues continue to cause headaches for IT departments. Security mandates grow exponentially as they struggle to prevent data leaks from private networks onto public clouds. The biggest concerns with public clouds are the loss of data and control of the location of that data...

Comments  (1)

C787d4daae33f0e155e00c614f07b0ee

The Right Way to Handle Shrinking Budgets

September 09, 2012 Added by:Robb Reck

We add new security tools by seldom get rid of the old ones. So, it’s no surprise that when our companies require us to reduce our budgets we don’t really know how to do it. In the face of these tightening budgets we need to adapt and survive. This leaves us with three options...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Error Logs and Apollo 11: One Giant Step For Risk Management

September 09, 2012 Added by:Tripwire Inc

Although Neil Armstrong is the hero of the Apollo 11 story, the planning, management, complexity and technology for the mission is often overlooked. Iit were not for testing and assessing risks associated with the systems the lunar landing would not have been a success...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Keeping Safe In The Cloud

September 09, 2012 Added by:Ben Kepes

“With the cloud, you don’t own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to... the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it...”

Comments  (0)

099757b145caa6965ea51494adbc25ba

How to Secure Windows 2000... For a Limited Time

September 07, 2012 Added by:Drayton Graham

A number of organizations are still using Windows 2000. It is up to the organization to determine the acceptable risk for continued use of Windows 2000-based systems. If Windows 2000 is a necessity at this time within your environment, here are some security techniques you can implement...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

DMTF's Cloud Infrastructure Standard

September 07, 2012 Added by:Ben Kepes

CIMI is arguably more complex than a simple standard – it reflects that people want to rubber stamp a standard, but also want to deliver proprietary functionality as a point of differentiation from the competition. CIMI is a positive initiative, but the proof is in the pudding...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

As BYOD Trend Grows So Do Malware Attacks

September 06, 2012 Added by:Bill Gerneglia

The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Inevitability of a Data Breach

September 05, 2012 Added by:Rafal Los

Only after many years of beating the drum that non-security professionals are waking up to the fact that security cannot be an after-thought in development. It'll take another five years before business executives are comfortable with the notion that they will be breached...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Real World Information Security

September 05, 2012 Added by:Tripwire Inc

Alex uncovered a poorly designed web page and convinced it to give up its secrets. What followed was a quick RDP war trying to plant our backdoor. I found myself with root level access having blasted away at it using Metasploit and uncovered several Easter eggs instructors had planted...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

The Deep Web vs. Network Security Monitoring

August 31, 2012 Added by:Dan Dieterle

The “Deep Web”, Dark Web or hidden internet, is a massive collection of sites and databases that don’t show up in standard search engines. So, is this a place that you want ANYONE on your corporate network to visit? NO WAY. Though many use Tor for legitimate purposes, the deep web just isn’t that kind of place...

Comments  (3)

3e35900ae6facc6c146a85c435c71d82

Best Practices for the Destruction of Digital Data

August 31, 2012 Added by:Ben Rothke

The need for effective media destruction is imperative given that digital media is the crown jewels of most organizations. From payroll, financial records, to personal information and company/trade secrets, there are terabytes of data that at the end of its lifecycle, needs to be effectively sanitized...

Comments  (0)

E973b16363b3de77b360563237df7e32

Steps to Ensure a Smooth(er) Migration to a Cloud Service

August 30, 2012 Added by:Bozidar Spirovski

Assuming you have selected a service to migrate to a cloud provider, and have selected the cloud provider, even after contract signing, things may still be far from complete. The migration process is the thing that can be very painful and can break the entire service for an extended amount of time...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Enterprise Security: Being Your Own Worst Enemy

August 30, 2012 Added by:Rafal Los

Enterprise security organizations can be their own worst enemies. Security is largely disconnected from the business, largely dependent on technology, and unable to be anything more than a cost center... and it seems like the more we rant and wave our arms the deeper the hole gets...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Cybercrime Controls for the Enterprise

August 30, 2012

The majority of attacks that result data breaches are simply not that complex, relying on well-known, tried-and-true methods. Yet most organizations lack the time and expertise to develop the security content— the breach detection rules and configuration hardening policies for servers—that can deter attempts...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Cloud Outages (Yeah, They Happen)

August 29, 2012 Added by:Ben Kepes

Cloud vendors are quick to point out how reliable their data centers are with redundant channels, power supply structures and the like. Any application running on the cloud needs to consider the same issues – it is unrealistic to rely on one single data center – a chain is only as strong as its weakest link...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

How Do You Change an Unhealthy Compliance Culture?

August 29, 2012 Added by:Thomas Fox

The best way to effect culture “is to combine strong leadership with the existing internal elements of a healthy corporate culture... while it may take as long to create a good culture as it does to establish a good reputation, a strong set of values is usually harder to destroy unless the company is itself dismantled..."

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »