Top

Tag: management


Network security

Top compliance and risk management challenges for financial organizations

December 6, 2019

Via: Help Net Security

Notable regulatory compliance and risk challenges remain high in a number of key areas for U.S. banks and credit unions, according to the results of a Wolters Kluwer survey. Rising risk challenges for financial organizations This year’s survey generated a […]


Access control, Security

How to evaluate a password management solution for business

August 26, 2019

Via: Help Net Security

Password managers are one of the most powerful defenses against breaches, which can cause massive damage and be incredibly expensive to mitigate. According to the Ponemon Institutes’ 2019 Password and Authentication Security Behaviors Report, 51% of respondents experienced a phishing […]


Application security, Security

PCI SSC Releases New Security Standards for Payment Software

January 18, 2019

Via: Security Week

The new PCI Secure Software Standard and the PCI Secure Lifecycle (SLC) Standard are part of a new Software Security Framework and their goal is to ensure that the development of payment software keeps up with modern practices. The PCI […]


Vulnerabilities

Supply Chain Security: Managing a Complex Risk Profile

December 12, 2018

Via: Threat Post

NYC — From Delta Airlines to Best Buy, a number of big-name companies were involved this year in data breaches – but even though their names made headlines, the actual security incidents occurred due to flaws in third-party partners. Across […]


Network security

Half of management teams lack awareness about BPC despite increased attacks

December 7, 2018

Via: Help Net Security

Trend Micro revealed that 43 percent of surveyed organizations have been impacted by a Business Process Compromise (BPC). Despite a high incidence of these types of attacks, 50 percent of management teams still don’t know what these attacks are or […]


Vulnerabilities

How to Reduce Hidden Endpoint Management Costs and Increase Efficiency

November 7, 2018

Via: Security Intelligence

We all want faster, better endpoint management solutions at a reduced cost — but how? In part one of this series, we broke down the SANS Institute report, “Understanding the (True) Costs of Endpoint Management,” and identified the top five […]


Mobile security

How Much Is Endpoint Management Really Costing You?

October 31, 2018

Via: Security Intelligence

Companies today are paying much more than they realize for endpoint management in terms of money, resources and speed — many of which are hidden expenses. A recent SANS Institute report titled “Understanding the (True) Costs of Endpoint Management,” examined […]


Network security, Security

New HITRUST program helps start-ups with information privacy and security

October 9, 2018

Via: Help Net Security

HITRUST is helping start-up companies make information privacy and security a foundational component while still focusing on growing their business with the introduction of the RightStart Program. The newly introduced program helps start-ups accelerate their adoption of the risk management, […]


Vulnerabilities

Why Endpoint Management Is Critical to Security Strategy

February 2, 2018

Via: Security Intelligence

Endpoint management is typically the responsibility of the IT operations or infrastructure teams, not the security team. So why should security care about endpoint hygiene? Pervasive Endpoint Vulnerabilities Attacks come from all directions, and many of them originate on endpoints. […]


Cloud security

Oracle Product Rollout Underscores Need for Trust in the Cloud

December 12, 2017

Via: Dark Reading

Oracle updates its Identity SOC and management cloud with security tools to verify and manage users trusted with access to cloud-based data and applications. Oracle is expanding its Identity SOC portfolio and Management Cloud with new cloud-based tools for identity […]


Vulnerabilities

What is vulnerability management? Processes and software for prioritizing threats

November 27, 2017

Via: CSO Online

Vulnerability management is the process of staying on top of vulnerabilities so the fixes can be more frequent and effective. Vulnerabilities in need of fixing must be prioritized based on which ones post the most immediate risk to the network. […]


Cloud security

Managing compliance is easier in the cloud

February 1, 2017

Via: InfoWorld

Cloud doubters often raise compliance requirements as a barrier to cloud adoption, but in fact cloud providers have many tools to ease compliance with regulations and industry standards. They can help you maintain compliance with the least amount of resources. […]


Network security

6 Tips For Stronger SOCs

November 15, 2016

Via: Dark Reading

Security operations centers (SOCs) are not as ubiquitous and well-run as you’d think. Gartner research has found that by 2019, only 50% of large and midsized companies will conduct security work from a SOC, and that’s up from 15% in […]


Cyber warfare, Cyber-crime

4 important tips for mentoring, coaching and growing women’s roles in cybersecurity

September 2, 2016

Via: CSO Online

Women are underrepresented in every industry, at every level of companies. Even more discouraging, a report from the Wall Street Journal suggests that there are significantly less women in the higher ranks of companies, indicating that growth of a female […]


Vulnerabilities

Key elements for successfully prioritizing vulnerability remediation

August 23, 2016

Via: Help Net Security

New vulnerabilities are disclosed every day, amounting to thousands per year. Naturally, not all vulnerabilities are created equal. In this podcast recorded at Black Hat USA 2016, Tim White, Director of Product Management at Qualys, talks about Qualys ThreatPROTECT, a […]


Network security

Managed SIEM: The Digital Detective Helping to Fight Cybercrime

August 2, 2016

Via: Security Intelligence

According to the Ponemon Institute’s 2015 “Cost of a Data Breach Study,” a typical organization of 15,000 employees can fall victim to 1,764,121 security incidents per week. Worryingly, only approximately 100 of these breaches are detected. That’s just one part […]


Network security

Why System Administrators Are So Crucial to Security

August 1, 2016

Via: Security Intelligence

You’ve heard the saying, “You don’t know what you have until it’s gone.” I think that wisdom applies nicely to the overall value that system administrators bring to their employers. Since July 29 is System Administrator Appreciation Day, today is […]


Access control

How To Manage And Control End User Access

May 25, 2016

Via: Dark Reading

The information security team is often seen as the department of “No.” At best, it’s viewed as the department that impacts productivity and drives down employee satisfaction. Take the simple task of an employee getting access to business resources to […]


Application security

Six Reasons Use Cases Are Crucial for Building SIEM and Security Operations Capabilities

May 6, 2016

Via: Security Intelligence

Suppose you’ve recently bought a piece of land and you’re interested in building a house on it. Whether you are acting as architect, general contractor, project supervisor or all of the above, the first step would be getting your hands […]


Access control, Privacy protection

Banks failing with password management, but why?

March 28, 2016

Via: Help Net Security

A recent study shows some terrifying results: banks in the U.S. often have less secure password policies in place than do social media websites. Specifically, the study found that 35 percent of the test group appear to have a significant […]