Showing Blog Posts: 1–10 of 32 tagged IT

  • How to Stay Safe on Cyber Monday

    by Jennifer Lawinski on November 30, 2015

    Tis the season for online fraud. And this year's Cyber Monday is expected to give cybercriminals more potential victims than ever before. Adobe expects online shoppers will spend more than $3 billion online today, and that's just the tip of the iceberg. More than 270 million shoppers are expected to spend more than $83 billion throughout the holiday season, and more than half of those purchases…

  • Cloud Data Centers and Cost Modeling: A Complete Guide To Planning, Designing and Building a Cloud Data Center

    by Ben Rothke on October 21, 2015

    Building a large enterprise data center is a mammoth task with myriad details. In an encyclopedic work, Cloud Data Centers and Cost Modeling: A Complete Guide To Planning, Designing and Building a Cloud Data Center, (Morgan Kaufmann ISBN 978-0128014134), authors Caesar Wu and Rajkumar Buyya have written an extremely detailed and comprehensive guide on how to effectively build a cloud data center. …

  • Taking Stock: Ranking the Next Billion-Dollar CyberSecurity Markets

    by RSAC Contributor on October 14, 2015

    This post in our VC-series comes from Venky Ganesan, managing director and cybersecurity investor of Menlo Ventures. With IT security spending estimated to crest the $75 billion annual mark before the end of 2015, there’s no shortage of emerging security sectors that will soon cross $1 billion in annual revenues. At the same time, with so many startups pursuing cybersecurity solutions, venture…

  • Insuring Cyber the Same Way as Natural Disasters

    by Rook Security on September 30, 2015

    There is no doubt that cyberinsurance is a fast-growing product with an important role in our current landscape where security breaches are happening at a breakneck pace. And many claim the market is nowhere near fully saturated...lots of companies remain unprotected. Most every Risk Manager has a disaster plan for what we typically think of as natural disasters: hurricane, fire, even polar…

  • Treat Yourself to a SPA, Not a Pen Test

    by Rook Security on August 27, 2015

    A lot of companies are asked to do a pen test by their clients, because they think a pen test will let them know if their business partner’s technology is “secure” against cyber threats. The scan happens. The areas that need to be fixed are fixed. And the client feels warm and fuzzy inside. However, this feeling is misleading as the company isn't necessarily more secure— all it says is that you…

  • Security Metrics to Drive Change

    by Tony Bradley on August 24, 2015

    What’s the point, really? You've dedicated terabytes of storage to capture insane volumes of log data, but for what? Yes, you can distill the highlights which make you look good and drop them in your reports. Be warned that those types of vanity metrics don’t provide any real value. Use the right security metrics in the right way, and you can clearly illustrate the issues. And that's how you…

  • What Black Hat and the NFL Have in Common: Strategy

    by Eric Cowperthwaite on August 19, 2015

    This time of year is a merging of two of my favorite things, Hacker Summer Camp aka BSidesLV, Black Hat and DefCon, and the beginning of the football season. On the surface it might not appear that these things have a lot in common. However, a bit deeper analysis tells us that the strategies employed by your security team and your favorite football team revolve around many of the same principles…

  • Change Your Gears

    by Securosis Team on August 17, 2015

    I'm a cyclist. Not necessarily a very good one, but I can hold my own in the middle of the pack. On group rides you always have the person who locks into a gear and sticks with it. Their pedaling cadence slows on hills, speeds up on inclines, and they don't really shift a lot. It isn't overly efficient, especially compared to the pro-level riders who keep a constant cadence and work the shifter…

  • Peers Discuss Partner Security

    by RSAC Contributor on July 31, 2015

    Ken Morrison, principal of IT consultancy Morrison Consulting, led security and risk professionals in a discussion about outsourcing as part of the Peer-to-Peer discussion at RSA Conference 2015 in San Francisco. Below is Morrison's notes from the session. Outsourcing to global partners is a regular activity by companies seeking to leverage their resources. Our session, Who’s invited to Your…

  • Security Program Governance, Application Security Domains

    by RSAC Contributor on July 28, 2015

    This is the last in a three-part series on IT security from Forsythe Technology. This post looks at governance and application security. Previous posts covered core infrastructure and threat and vulnerability management and data protection and identity and access management. Innovating Your Security Mindset In the previous post, I talked about the role data protection and identity and access…

This document was retrieved from on Mon, 30 Nov 2015 13:51:13 -0500.
© 2015 EMC Corporation. All rights reserved.