Blog Posts Tagged with "Enterprise Security"
Make It So: Accelerating the Enterprise with Intent-Based Network Security
June 13, 2020 Added by:Avishai Wool
How organizations can realize the benefits of intent-based networking across their hybrid networks.
Comments (0)
Building Modern Security Awareness with Experiences
June 14, 2019 Added by:Perry Carpenter
Think about your own organization’s culture and then find ways to create immersive, engaging experiences that will resonate with your people.
Comments (0)
What bicycle thefts can teach us about mobile security
February 17, 2017 Added by:Avi Rosen
Businesses can apply protection to each device and the data it holds, in a way that is appropriate to the device user’s role, and risk profile, which also makes it easier for organizations to lock down and manage the complete mobile security cycle.
Comments (0)
The Third Party Threat
February 16, 2017 Added by:Michael Patterson
A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.
Comments (0)
When Ransomware Strikes: Does Your Company Have a Data Disaster Recovery Plan?
February 16, 2017 Added by:Jeff Erramouspe
Ransomware is rampant and those who commit the attacks aren’t discriminating against any industry, company size, or company location.
Comments (0)
Alan Turing, Undecidable Problems, and Malware
January 23, 2017 Added by:Kenneth Geers
In order to keep workers happy and productivity high, sometimes you have to run untrusted code. But that code should be run in quarantine, where it cannot damage your IT infrastructure.
Comments (0)
The Forgotten Security Frontier: The Phone Call
January 23, 2017 Added by:Myk Konrad
The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.
Comments (0)
Fighting Alert Fatigue
July 06, 2016 Added by:Mike Paquette
By augmenting their efforts with behavioral analytics and machine learning, teams can be sure they reduce alert noise and fatigue while quickly identifying and addressing the issues that actually matter before they hurt their customers or the bottom line.
Comments (0)
Why Your Next Generation Firewall Cannot Prevent Next Generation Threats
June 15, 2016 Added by:Ajit Sancheti
Next generation firewalls had a good ten year run and are still good for the network perimeter. But when it comes to protecting the inside of the enterprise perimeter, they lack significant capabilities.
Comments (0)
HP Urges Customers to Rethink Security Strategy
September 17, 2013 Added by:InfosecIsland News
HP today announced new products and services that enable enterprises to disrupt the adversary marketplace, manage risk and extend their security capabilities to better protect themselves against a growing threat landscape.
Comments (0)
Deconstructing Defensible - Defensible is not the Same as Secure
April 02, 2013 Added by:Rafal Los
This post and the few that follow will go through the five basic ideas behind defensibility and why defensible is a state we should be striving for as enterprise security professionals.
Comments (0)
Defending the Corporate Domain: Strategy and Tactics
March 27, 2013 Added by:Rafal Los
Strategy without accompanying tactics is a lost cause. Tactics without a solid footing in strategy is an expensive lost cause. The maturity of an organization's security team is directly proportional to their ability to have a foundational strategy and be able to implement tactical measures and feedback to adjust to changing conditions in order to defend adequately.
Comments (0)
The Castle Has No Walls - Introducing Defensibility as an Enterprise Security Goal
March 19, 2013 Added by:Rafal Los
It's time to retire the "castle" analogy when it comes to talking about how real Information Security should behave. I still hear it used a lot, and if you walked around the show floor at RSA 2013 you noticed there is still a tremendous amount of focus and vendor push around 'keeping the bad guys out.'
Comments (1)
Enterprise Software Security - The 2 Major Viable Models
March 16, 2013 Added by:Rafal Los
I can't even express how good it is to be back in the field, solving problems and working with the enterprises again. It's interesting how little the landscape changes in software security and how many of the same challenges that existed during my GE days (2003-2008) are still around today.
Comments (0)
Ensuring Continuity of Services During Change Incidents
January 25, 2013 Added by:Bozidar Spirovski
Services are most vulnerable during change. Continuity of service needs to be ensured during change, and large portions of several ISO and BSI standards are focused on proper management of change. However well controlled, an incident can occur during the change, thus causing failure of service...
Comments (2)
Are you meeting your perceived security obligations?
January 19, 2013 Added by:Tripwire Inc
Security professionals today identify lack of qualified talent and lack of organizational funding as a key problem to their daily job; which probably implies that they are doing what they can with what they have; which likely may not meet expectations...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider