Blog Posts Tagged with "Security Solution"

F3828ca8c8a9ac7e4fc6a5cc12f52066

What Is Hypervisor-based Security and Why Is It Important in Stopping Zero-Day Exploits?

August 11, 2017 Added by:Bogdan Botezatu

Utilizing the hypervisor for security measures is a crucial paradigm shift, as the number of techniques for utilizing exploits remains very small.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Fifteen Tips to Improve Your Infosec Risk Management Practice

November 29, 2012 Added by:Tripwire Inc

For years security vendors have been able to play off the general fears of malware and cyber attacks. As the scope of protecting data has become more complex, we’ve slowly learned that deploying more security controls alone is not a risk management solution...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Clean That Network Traffic

October 31, 2012 Added by:Richard Stiennon

Why not deploy an intelligent appliance behind the router and in front of the firewall? Filter out all the junk before you expend any resources in your firewall, or log all the events with your IDS/SEIM. Reduce your need for multiple servers and load balancers. This is like a reverse osmosis for your network...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Your Next Critical Security Project May Not Be What You Think

October 23, 2012 Added by:Rafal Los

If we're honest with ourselves, we can look around the organization and find several projects that even though they are implementation-complete, are hardly "complete" as they sit. Too often after a catastrophic failure, or security incident we're pre-disposed to making hasty purchases to effectively stop the bleeding...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security and the Enterprise: Connect What?

September 20, 2012 Added by:Tripwire Inc

We’re going to use the phrase “Connecting security to the business” with almost annoying frequency because it can change the way the business views security, and vice versa. This begs a primer of sorts: What do we mean by all this “connecting security to the business” talk?

Comments  (0)

Ff632049ba1218ecd55b8122b2112642

The Best in Practice

September 12, 2012 Added by:Randall Frietzsche

If we are charged with designing, architecting, implementing, deploying, integrating, training and supporting security technology, processes and policies within our organization, we might discover that this work is really an art more than a science...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Throwing Stones in Glass Houses: Views on the Security Industry

August 26, 2012 Added by:Rafal Los

The Information Security industry is rife with negativity. Why are we so quick to pile on to others' pain? Isn the security community just more cynical by nature, is it psychological? Are we wired this way? As an industry, our goal is to create more resilient, more secure' and more defensible postures for everyone...

Comments  (1)

A88973e7d0943d295c99820ab9aeed27

Tackling Modern Malware

August 15, 2012 Added by:Simon Heron

With conventional antivirus products, their signature bases are never completely up to date. When a new infection emerges, it simply roams freely across all endpoints. Conversely, WSA leverages behavioural monitoring to pick up infections when it isn’t sure whether a file is malicious or not...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

About Antivirus, Security Awareness, Security Usability...

July 21, 2012 Added by:Ali-Reza Anghaie

No matter how many times it's warned against, most Security professionals use themselves and their contemporaries as the basis for what's "right". And as security becomes higher profile with more incidents it really starts looking like instead of having cynical contempt for the users, it's more like plain excuses...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

Security Vendors: Absit Reverentia Vero

July 09, 2012 Added by:

Vendors are driven to sell and sell at all costs. Product features stagnate, services under perform. We the customers suffer and the security postures of all organizations plummets. Adversaries can spend less on penetration innovation while at the same time more easily bypass our defenses...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Spring Cleaning for Your Security Toolbox

July 08, 2012 Added by:Robb Reck

Give each system and process a priority rating. The ones with the highest rating get the training, money and man-power assigned to master, maintain and run them. The ones with lower ratings get a project plan set up for decommissioning. As in most things in life, true excellence is in quality, not quantity...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Myth or Fact? Debunking the Biggest Information Security Myths

June 27, 2012 Added by:Tripwire Inc

Myths have existed throughout history in different cultures and times. The information security industry isn’t excluded from having its own share of myths. So, I got in touch with some European security professionals to share their views on some of the biggest security myths that need busting...

Comments  (1)

F2792196079f2c16cd02be6e9ff5b3da

The Fear Factor in Information Security

June 13, 2012 Added by:DHANANJAY ROKDE

Vendors are increasingly using the fear factor and coarse tactics to pressure information security managers into deploying rather unnecessary technologies and products. Why have we never heard of a vendor pitch claiming responsibility of failure to protect a company’s infrastructure?

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Solving Problems from the Security Viewpoint

June 07, 2012 Added by:Rafal Los

From experience, there are 3 clearly identified causes for poor adoption of well-intentioned security-built technology into everyday development and systems building... Let's take a look at them and see what can be done to raise the level of adoption from each case...

Comments  (0)

099757b145caa6965ea51494adbc25ba

The Importance of Mobile Device Management for Enterprise Security

May 13, 2012 Added by:Drayton Graham

Almost everyone has their own mobile phone these days, nd they are quickly becoming a necessity in business. In order to enable the kind of freedom BYOD brings, the corporate network and data needs to be protected. Mobile Device Management is a solution that will help with this...

Comments  (2)

2e541940bc9b12ea62726bb51ed8787d

BYOD is really BYOPMD

May 07, 2012 Added by:Phil Klassen

BYOD should make the security society very nervous. For those who still believe that personal devices will never be a part of your network, remember, never say never. Regardless if non-corporate devices have accessed your network or not, the first step is acceptable use policy...

Comments  (2)

Page « < 1 - 2 - 3 > »