Blog Posts Tagged with "change management"

7e364bbac217114a59e547b354e7f7ad

Don’t Be Caught Playing the Fool (A Lesson in Why Change Control is Important)

January 03, 2013 Added by:Gary McCully

This is a real world story around the dangers of not following proper change control processes when placing new systems in production. In this blog I will discuss how one person’s actions could have resulted in an attacker gaining complete access to the organization’s internal network. I am hoping this example will cause organizations to take their change control processes a little more seriou...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Unconventional Defense - Taming a wild environment with CCRM

November 15, 2012 Added by:Rafal Los

Configuration, Change and Release Management is crucial to being an effective information security organization in an enterprise large, or small. If you don't have a handle on the rate of change in your enterprise, you have absolutely no hope of effectively securing anything...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Protection Tax

October 25, 2012 Added by:Tripwire Inc

Unfortunately, you don’t know what you don’t know. You don’t know what your security posture looks like between scans, you don’t what configuration-related exploit or breach indicators you might be missing. In today’s security-is-just-an-illusion environment, getting visibility and knowledge is everything...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

CISSP Reloaded Domain Six: Operations Security

April 18, 2012 Added by:Javvad Malik

Some argue that operations security is primarily focused around IT and bring up the old argument of IT vs infosec and the baggage that comes along with that. It’s an argument as old as whether PC’s are better than Macs, Ninja’s could beat Pirates or Cagney was better than Lacey...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Change Management and Process Improvement

December 19, 2011 Added by:Rafal Los

I don't know of a bigger detractor to security than a broken enterprise change management process... whether you work for a million node global corporation, or a company with 100 laptops and an outsourced IT - poor change management will be the death of your security posture, period...

Comments  (0)