OpenDNS's Andrew Hay sees danger confronting many enterprises in the era of the "Internet of Things" as Internet-ready consumer devices, not architected for security, find their way onto corporate networks, often unbeknown to administrators.
The mobile mind shift is here, and as employees increasingly favor using mobile devices both personal and company-issued for work, enterprise IT must ensure data protection and enable user productivity. Relying on traditional firewalls and local file shares is no longer enough when it comes to securing and backing...
Code42 is predicated on two beliefs: firstly, we believe our customers should benefit from cloud solutions without compromising their data security, regulatory or privacy requirements. Secondly, the customer, not the provider, should decide how a cloud solution is deployed.
We don't demand blind trust from our...
Hacking Team, an Italian vendor of "easy-to-use offensive technology" that it sells to government agencies, has been hacked. Leaked customer lists reportedly name the FBI and DEA, plus the governments of Bahrain, Russia and Sudan, among others.
Working out the potential return on investment on a new server or application is relatively straightforward - if it enables you to do more in less time, profits are likely to go up, making it worth buying. If there are no obvious benefits, however, and no immediate gains, then the computation is far more...
Working out the potential return on investment on a new server or application is relatively straightforward - if it enables you to do more in less time, profits are likely to go up, making it worth buying. If there are no obvious benefits, however, and no immediate gains, then the computation is far more...
Working out the potential return on investment on a new server or application is relatively straightforward - if it enables you to do more in less time, profits are likely to go up, making it worth buying. If there are no obvious benefits, however, and no immediate gains, then the computation is far more...
Just as physical hygiene involves neutralizing sources of infection, Open Source Hygiene entails keeping software stacks and application portfolios free of known-exploitable versions of open source code. Implementing Open Source Hygiene requires ongoing code maintenance, informed open source technology selection, and...
Major financial services companies face a serious dilemma when it comes to open source software security. Today, global organizations such as investment banks, insurance companies, asset management and estate planning entities, and securities services providers have thousands of software applications in production at...
Based on their frequent media coverage, Internet security incidents have become a popular topic of conversation. So, naturally, the talk about security risk extends to the cloud - in a recent cloud computing usage report, 65 percent of surveyed organizations mentioned security as their top obstacle to cloud...
In today's new threat landscape, building a strong perimeter based on a hierarchical network design is no longer an effective approach to security. Notions of "trust but verify" are outdated and extremely vulnerable to a plethora of cyberattacks. Cybercriminals have found a multitude of ways to infiltrate the wall you...
Soon after putting monitoring, configuration and remediation capabilities into place to help ensure compliance with IT security objectives, an organization will have questions. Are we secure? Where are we exposed? Are our initiatives working? Have we met our targets? What progress are we making toward achieving...
In Forrester's 82-criteria evaluation of application security vendors, we identified the 12 most significant service providers in the category - Beyond Security, Checkmarx, Contrast Security, Coverity, HP Fortify, IBM, Qualys, Quotium, Trend Micro, Veracode, Virtual Forge, and WhiteHat Security - and researched,...
Around the world, organizations are overcoming their security concerns and are taking the leap to cloud computing in order to realize capital expenditure cost savings and leverage a pool of specially trained security monitoring resources.
Download this white paper to explore:
More than a trend, cloud-hosted...
Security Information and Event Management (SIEM) systems cause a lot of controversy among security folks. They are a cornerstone of every enterprise security program but SIEM continues to generate many complaints and elicit considerable angst among security professionals.
Download this white paper to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.