There’s an interesting phenomena happening. IT professionals who normally look after infrastructure and are accustomed to accommodating new business initiatives are now scrapping whole projects. According the recent CIO Insight Research Exclusive Where the IT Dollars are Headed in 2012, innovation is now coming from spending on mobility and cloud-related investments. New platforms and development Read more…
Threats from trusted employees, partners, consultants and the like continue to be an issue across every business. Because insiders have things outsiders don’t, like trust and access, they are able to operate with greater stealth and ease – and cause greater damage in a shorter amount of time. While there are two categories of insiders, Read more…
Tags: Insider Threats, Security Connected Reference Architecture
Once upon a time, we had a technocracy. A small group of individuals decided what technology we would use, where we used it, and how we used it. The technocracy is over. Individuals are finding that the consumer devices they buy, whether they’re a Windows PC, Mac, tablet, or smartphone, are more capable than what Read more…
Tags: consumerization, Security Connected Reference Architecture
A spark of innovation…or perhaps insanity Alice: “What should we do at RSA this year?” Bob: “Let’s build the entire McAfee Security Reference Architecture out of Legos!” Alice: “Yea, that would be totally awesome, but really?” Bob: “Think about it; if we do this, we might get McAfee to pay for our SHIP.” Alice: “Genius. Read more…
Tags: #SecurityLegos, Security Connected Reference Architecture
Change is inevitable. Businesses react to the market and make changes as technology changes to support the business. Controlling and monitoring change is built into the business model – watching for trends, taking action to keep current positive revenue streams safe, etc. So why is it so hard for IT to adopt this same kind Read more…
Tags: Change Control, Security Connected Reference Architecture
The term “fixed function” conjures images of ATMs and digital displays – things that not only perform a single function, but that are often installations designed to remain in a fixed location. Increasing numbers of enterprise and consumer systems are singular in purpose, but many have been integrated into larger mobile systems. McAfee’s recent report Read more…
Tags: Fixed Function Devices, Security Connected Reference Architecture
Without a doubt, the world has embraced mobile. Everyone’s doing it – from consumer and enterprise, to geography, public, private, and business vertical. In addition to the power and portability of smartphones and tablets, they are in most cases always connected, application-ready, and designed to take advantage of extensive web 2.0 resources and cloud components. Read more…
Tags: mobile security, Security Connected Reference Architecture
Simply put, information is valuable. From intellectual property and financial data to personal details and government secrets, internal and external attackers have been targeting sensitive information since well before the digital era. The difference today is that information has gone viral. It lives in the datacenter, laptop, removable storage device, mobile phone, and in the Read more…
Tags: Information Protection, Security Connected Reference Architecture
The Payment Card Industry (PCI) Security Standards Council is an open global forum, launched in 2006, responsible for the development, management, education and awareness of the PCI Security Standards – including retail standards for data security, payment application data, and pin transactions. As we move forward through our recent economic ups and downs, the PCI Read more…
Tags: PCI Compliance, Security Connected Reference Architecture, SMB
I’ve always felt uncomfortable giving out my zip code to retailers. Now, a Massachusetts ruling has sent a clear message to businesses by concluding that zip codes are considered personally identifiable information (PII), which limits the way those numbers can be used and recorded during credit card transactions. In this case involving a large craft Read more…
Posts tagged under Security Connected Reference Architecture