Articles under the topic Security
Securing the Next Generation Digital Enterprise: Focus on Innovation
Across industries, we are witnessing the transformation of the enterprise information management model. Enterprises must focus on managing risk, while developing new enterprise operating models that optimize investments and enables the business. New opportunities bring new risks, as the model transforms so do the security needs. Typical approaches are insufficient for addressing this array of security challenges.
Interview: Charles Weaver, CEO of MSPAlliance
Jack Koziol of the InfoSec Institute talks with Charles Weaver, the co-founder and CEO of the MSPAlliance about the work done by the association, the future of managed services and some of the challenges in managed services right now that are being overlooked. According to Weaver, cloud will be playing a more pronounced role in managed services.
CIOs Take on Target Breach: INFOGRAPHIC
Minneapolis-based Retail Chain giant Target's massive data breach, claimed its highest-profile victim to date (President and CEO Gregg Steinhafel), exactly two months after its CIO Beth Jacob was asked to resign. DynamicCIO.com asked few CIOs on their personal opinion/views on this subject. It is indeed a wakeup call for Chief Executives to create a sense of security culture within a corporation. It certainly is not a blame game.
Majority of Mobile Security Breaches will be Result of App Misconfiguration
By 2017, as many as 75 percent of endpoint-related security breaches will be the result of improper application configuration on mobile devices, as attackers continue to shift their focus towards targeting smartphones and tablets finds a research from Gartner. The most obvious platform compromises of this nature are 'jailbreaking' on iOS or 'rooting' on Android devices.
Average Enterprise Generates 10,000 Security Events Per Day
Research finds that it requires manual analysis to determine if there are early indicators of a compromise of systems. It is daunting for security staff to manually trawl through mountains of alerts in order to discover which (if any) constitute a real and present threat. The findings also sheds light on why recent attacks at organizations like Target were undetected for so long, since alerts don't equal infections.
Snowden Leaks Preventing Enterprises from Moving to the Cloud:Infographic
Enterprises across the globe are changing their cloud buying behaviour as a direct consequence of the Snowden revelations. A report from NTT Communications has found that businesses are concerned and they are acting decisively to protect their data by keeping it where they know it will be safe. ICT decision-makers want to protect their company's data even if it means delaying cloud computing projects.
Social Networks and Financial Institutions Top Phishing Bait
Phishing operations overwhelmingly choose to impersonate social networks and financial organizations to compromise targets, accounting for more than two-thirds of the "bait" employed by attackers. They are increasingly focusing on bank web services to gain direct access to victim's banking accounts in order to pilfer funds, providing immediate financial gain for the attackers.
Enterprise Security: A Management Perspective
Stakeholders generally frown on scanning and patching the critical infrastructure. This is because enterprise security teams are considered as a pain to the day to day operations for the rest of the enterprise and also the fact that security management in its real vigor is never atop the priority list for stakeholders. For decades we have witnessed that, only after a breach, an enterprise strengthens its security infrastructure.
One-Fifth of All Malware Ever was Created in 2013
A recently released report that analyzed the development of malicious code indicates that in 2013 as many as 30 million new strains of malware were introduced, an average of about 82,000 new variants each day last year, and accounted for one-fifth of the 145 million malware samples ever created. In addition, the report also takes a look at attacks, vulnerabilities, and trends in cybercrime and hacktivism.
CISO: Time to Up the Game and Get an Image Makeover
Even as CISO becomes a full-blown function, the ground reality is that for most organizations the face of the CISO is still someone planning and managing security systems. As security becomes intrinsically linked with business growth the CISO needs to move out of IT's shadow and get an image makeover as a business leader and custodian of enterprise reputation, risk management, brand promise and trust.