ADS BY GOOGLE
Security Management

Recent events have taught us that everyone is vulnerable to data breaches. Now that the majority of businesses are running services in the cloud, whether sanctioned, rogue or Shadow IT, there is much work to be done in beefing up cloud security. And, with each major data breach that ta...
For retailers everywhere, it’s a challenging new day. Security threats are a constant – both inside their four walls and out. The big security breaches we hear about on the news; the smaller ones sometimes not. But their impact remains costly to us all. The need for mobility, rapidly e...
The earliest challenge to the original homebrew microcomputer geeks was to get little indicator lights to flash. Then, by toggling several switches to turn the lights on and off, the computer would start doing other things, processing instructions within the confines of several hundred...
There has been a lot of media attention on Heartbleed and as always that means a lot of bizarre and often conflicting advice. I sat down (for a very long time) to find the truth of the matter and bring it together in one single article for those involved in enterprise mobility. "The ...
Cloud computing brings a myriad of benefits for any enterprise, but it is also a cause for concern in a world where, according to InformationWeek, cyber criminals are now targeting "any company where they can find data to resell, disrupt or exploit." Moving your company's sensitive da...
Learn how a Process Intelligence Engine identifies business risks and highlights opportunities for process improvement by collecting, correlating and analyzing raw observations throughout the SDLC (source code, defects, build, requirements, ALM, test management…)— helping you mitigate ...
Savvy organizations, HP among them, are turning to preventing attacks, rather than just detecting them and remediating them. The high cost of unwanted intrusion and malware across corporate networks is well known. Less talked-about are the successful ways that organizations are thwart...
Many news organizations including The Washington Post are reporting that the latest documents leaked by former NSA contractor turned whistleblower Edward Snowden show the NSA is in the early stages of working to build a quantum computer that could possibly crack most types of encryptio...
As regulatory oversight across the financial landscape continues to drive greater transparency and stricter penalties, outsourcing to the private cloud has become an integral resource for hedge fund and private equity managers. Cloud infrastructure services are now synonymous with incr...
information and other data that must be protected. Medical practices, credit unions and independent retailers all face HIPAA, PCI and other standards. With so many regulations and limited budgets, how can small businesses keep up? Here are the top security mistakes that leave SMBs vuln...
Explores three ways to help development teams bear the burden of security: use pen test results to harden the application, leverage service virtualization for security scenarios, & adopt policy-driven development to help engineers understand and satisfy management’s security expectatio...
Disaster Recovery (DR) has typically only been used by organizations for applications deemed to be mission critical. This was because organizations didn’t want to incur the expense associated with DR for less important applications. Today, because of cloud computing, many organizations...
Within the ThreatConnect Intelligence Research Team (TCIRT), we feel that sharing what we know, whether publicly or privately, helps to grow our organization. We see information sharing as a key investment area, allowing our team to more efficiently save time and money while helping u...
Perpetual preparedness is tough to maintain. Vulnerability management tends to be an overwhelming task because of the growing number of devices and continual stream of warnings, alerts and notifications— whether it is security patches or zero day exploits, you name it. Mapping how thes...
The digital age has forced a kind of dependency never before seen, a dependency on our inbox. The mere thought of losing these emails is inconceivable where the thought of it leaves us with a sense of panic, one similar to losing our credit cards or house key. Unfortunately, the potent...
The latest headlines in the ongoing surveillance soap opera focus on the revelation that the U.S. has been eavesdropping directly on German Prime Minister Angela Merkel. The reaction in Germany has been strong with many officials publically condemning the surveillance. After the NSA’s...
When you think of security do you think of locks, guards or even your home security alarm? At the moment security is more likely to bring up thoughts of hackers, PRISM and well-publicized data breaches. Of course I think of the cloud when discussing security. In the contemporary world...
Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. ...
Imagine you work at a company preparing to issue its quarterly earnings report. The phone rings. It’s bad news. A coworker has discovered that a former employee has been logging into the company’s network for months. It’s unclear whether the former employee has used this illicit access...
Hackers and other attacks have become a major concern for businesses of all sizes. There are many reasons why your network could be taken out and rendered offline. Having your website down for even a few minutes can cause serious damage not only to your bottom line but also to your com...
CSC Global Cybersecurity, in a strategic partnership with HP, is helping companies and governments better understand and adapt to the tough cybersecurity landscape. We’re going to learn from a panel how professional services provider CSC, in a strategic partnership with HP, is helpi...
For many organizations, cloud computing has become an integral part of their everyday business. Many companies are relying on cloud applications for fundamental operations such as CRM and email and are looking to increase utilization of the cloud for other functions. For others, adopti...
What is the most secure way to authenticate electronic data? Until recently, many technical people would have answered ‘cryptographic keys’ without blinking. But recent headline events – and a ‘biggie’ last year – have raised serious doubts about the ability of cryptographic keys to pr...
Lake Health's Information Security Officer has been expanding the breadth and depth of risk management there to a more holistic level -- far more than just a series of security products. Many people are practicing IT security and they're employing products and technologies. They're pu...
One of the great revelations of the Internet has been how many gone-wrong sociopaths, thieves and spies there are in the world. Symantec, Kaspersky and Intego are reporting a hard-to-detect and hard- to-eradicate Trojan that sneaks onto VMware implementations, “making it possibly...
The Open Group's Jim Hietala recaps presentations at the recent Open Group Conference on cybersecurity and protecting global supply chains. Cybersecurity is at a critical juncture, and conference speakers highlighted the threat and attack reality and described industry efforts to move...
Today, security is undoubtedly the biggest risk and negative side effect to cloud computing. Fortunately, the status quo is about to change. The Trusted Computing Group (TCG), a not-for-profit organization that has developed open standards for computers, networks, storage and mobile de...
Joe Menn explores the current cyber-crime landscape, the underground cyber-gang movement, and the motive behind governments collaborating with organized crime in cyber space. Maybe you can make your enterprise a little trickier to get into than the other guy’s enterprise, but crime pa...
We meet with OPSWAT’s CEO Benny Czarny to talk about the F5 partnership and Steven Gill, VP Engineering, gives us a demo of some of their new technologies. ps Resources: F5 YouTube Channel F5 Partner Page OPSWAT Technorati Tags: F5, RSA, Pete Silva, security, business, education, techn...
Researchers from North Carolina State University and IBM have developed a new way to prevent malware from being spread in cloud computing infrastructure through compromised hypervisors. HyperSentry is an "out of band" process that continually monitors the integrity of virtual machine ...
Looking ahead, the X-Force Research and Development team has identified some key trends to watch for in the future, including: Cloud Computing — As an emerging technology, security concerns remain a hurdle for organizations looking to adopt cloud computing. As organizations tran...
We are constantly bombarded with articles and presentations about the security risks in cloud computing and why organizations need to be concerned about them as they consider a move. The truth is that organizations DO need to be concerned about security – but they needn’t be paralyzed ...
A session by Terry Woloszyn, Founder/CTO of PerspecSys, addresses "data privacy, residency, and security in the cloud." The speaker notes, "Cloud solutions, especially Software-as-a-Service (SaaS), have questions regarding data security and governance arise. Depending on your jurisdict...
Charney explained that identity solutions that provide more secure and private access to both on-site and cloud applications are key to enabling a safer, more trusted enterprise and Internet. As part of that effort, Microsoft today released a community technology preview of the U-Prove...
Depending on how IT executives handle the situation, reactions to data loss reports can range from indignation to outrage, with personal consequences for the decision-makers. IT executives at ChoicePoint, Inc., looked like heroes when they reacted swiftly to a potential data breach in ...


ADS BY GOOGLE