Menu

Blogs

Showing Blog Posts: 51–60 of 132 tagged Enterprise Defense

  • Are Security Teams Ready to Handle the End of Year Challenges?

    by Fahmida Y. Rashid on November 12, 2014

    While we continue with the budget discussion, it's important to think about some of the unique challenges present as we approach the end of the calendar year. There are various things security professionals need to do at this time of the year, and David Matthews discusses some of them on Nov. 20 in Incident Response: Are You Ready for the End of the Year? As the former director of incident…

  • Preventing Another Holiday Season Data Breach

    by Fahmida Y. Rashid on November 11, 2014

    Businesses—not just retailers—spend months developing plans for the holiday shopping season. Unfortunately, many of them haven't thought about security during those strategy sessions. "People have different mentalities when they look at the end of the year," says Chris Strand, senior director of compliance at Bit9. We've already listed some of the challenges associated with the end-of-the-year…

  • Webcast Recap: Finding Security Resources Inside Your Organization

    by Fahmida Y. Rashid on November 5, 2014

    As part of the budget planning exercise, security leaders have to prioritize their projects and initiatives for the next year. Savvy security leaders know to look for security resources in other areas of the organization, Denim Group principal John Dickson said in a recent RSAC webcast. "This is not about vendors selling security solutions to CISOs or CSOs," Dickson said. "This is about internal…

  • News Pick: Data Breach Targets Speak

    by Fahmida Y. Rashid on November 4, 2014

    While any organization can suffer a data breach, some organizations seem to be bigger targets than others. Representatives from financial services, retail, media, and healthcare organizations talked about their security strategies at this year's Privacy Xchange Forum in Scottsdale, Ariz., Dark Reading reported. Not all industry sectors face the same threats. Organizations have to finetune their…

  • Security Reality: Special Challenges in Q4

    by Fahmida Y. Rashid on November 3, 2014

    The end of the year is a busy time for information security professionals. There are a lot of balls to juggle, and our adversaries are poised to attack if we look in the wrong direction. The team behind Target’s data breach last year took advantage of the retailer’s increased traffic volume—both online as well as through its brick-and-mortar stores—to sneak in and infect the point-of-sale…

  • Network Security Appliance: Build or Buy?

    by Joshua Marpet on October 29, 2014

    Monitoring your network can be a seriously unpleasant task. It involves everything from maintaining firewall rules, watching traffic, looking for problems, keeping track of the latest issues on the Internet, checking log data on the dashboard, correlating events—oh dear God, it keeps going! So, what do you do? Do you use a myriad of tools, stitch them together with some scripting, document the…

  • Risk Assessments Critical for Budget Planning

    by Fahmida Y. Rashid on October 22, 2014

    Planning for next year's budget is stressful for everyone involved, but information security professionals have the added challenge of translating their requests into business risks to get senior management buy-in. Understanding how the threats and gaps in protection map to business risks will help streamline the first round of budget planning. It is critical that you perform a full risk…

  • Making Room for Security Training in Your Budget

    by Fahmida Y. Rashid on October 13, 2014

    When there are so many security threats demanding our attention and initiatives needing funding, it can be difficult to decide how to allocate the security budget. Security awareness training goes beyond preventing some attacks to improving an organization's overall security posture. Over the past few months, we've seen attackers increasingly relying on phishing and other social engineering…

  • Pre-review: Measuring and Managing Information Risk: A FAIR Approach

    by Ben Rothke on October 5, 2014

    Some of the music composed by Rachmaninoff had monstrously difficult parts that were full of big, fat chords. In Measuring and Managing Information Risk: A FAIR Approach, authors Jack Freund and Jack Jones have created the equivalent of an information security concert, full of big, fat chords. The book is nearly 400 pages of densely packed chords, which can lead the reader to truly understand the…

  • The Once and Future Network Security Appliance

    by John Linkous on September 16, 2014

    In the early 2000s, the network security appliance became ubiquitous. Beginning with Web application firewalls (WAFs), and eventually extending through all seven layers of the network model, security appliances were being popped into server racks like candy. "Need to filter spam? There's an appliance for that!" "Do you want to analyze the flow data generated on your firewalls? There's an…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 02 Aug 2015 10:23:00 -0400.
© 2015 EMC Corporation. All rights reserved.