Blog Posts Tagged with "Security"
May 03, 2016 Added by:Ganesh Kirti
We looked at how well CASBs would fare in helping enterprises survive the treacherous 12 and guess what? CASBs clearly address nine of the treacherous 12 (along with many other risks not mentioned in the report).
January 13, 2016 Added by:InfosecIsland News
Chief risk officers (CRO) will need to keep close watch on a number of strategic, operational, and external risks this year. Effective risk management and mitigation will be critical, since companies' strategies, business models, operations, reputations, and, ultimately, survival are on the line.
January 12, 2016 Added by:InfosecIsland News
According to the results of a new global study, commissioned by CA Technologies (NASDAQ:CA), only 20 percent of organizations that have attempted to implement DevOps have fully deployed it.
November 12, 2015 Added by:Mark Papermaster
Dedicated hardware in the form of a secure processor enables more secure computing, whether on a PC, laptop, server, or an embedded device. The hardware provides encryption acceleration to protect data without slowing the user's experience.
November 12, 2015 Added by:Emil Eifrem
Good access management requires a comprehensive and intelligent system in place for quick and accurate identification of an individual’s right to view certain information. This means a more granular and flexible approach to control is needed. This is where graph databases can help.
September 23, 2015 Added by:Ilia Kolochenko
The first issue with the majority of CTFs is that they focus on single result (flag), rather than a process of comprehensive consecutive security testing.
September 09, 2015 Added by:Jayson Wylie
Not everyone is technology savvy and push to get something to function verses securing it to the extent that it should be. Even though the latest wireless routers will use the more up-to-date security configurations, there are older setups that may not be adequate.
July 06, 2015 Added by:Steve Durbin
Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.
April 16, 2015 Added by:Eduard Kovacs
With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.
April 02, 2015 Added by:Christopher Budd
Back in the early 1990s, AT&T capitalized on this with their “You Will” campaign, which outlined some of the things they said “you will” be able to do in the future. The bright future of technology is intriguing and exciting, but we must first take responsibility for our security and privacy as to avoid any downfalls.
February 12, 2015 Added by:InfosecIsland News
Please join Virtustream and SecurityWeek on Wednesday, Feb. 18th at 1PM ET for a live webcast on enterprise security trends.
January 26, 2015 Added by:Mav Turner
Continuous compliance involves constantly reviewing processes and quickly making any necessary updates as a result of deviations from their intended performance. However, despite the fact that continuous compliance is effective at eliminating the gaps between compliance and security, it also greatly increases the complexity of managing compliance.
September 26, 2014 Added by:InfosecIsland News
Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.
September 16, 2014 Added by:Nate Kube
There are differences between industrial control systems and enterprise IT networks resulting in different security needs. To protect industrial networks, system operators must opt for an industrial next gen firewall with an IDS that fully understands industrial protocols and the specific context of each industrial command.
April 22, 2014 Added by:InfosecIsland News
Point-of-sale (PoS) attacks are declining, while Web application attacks and cyber-espionage is increasing, according to the latest edition of the annual Verizon Data Breach Investigations Report (DBIR).
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015