Cybersecurity and Risk Management

Bellwether cybersecurity technologies -- advanced endpoint security, behavioral threat analytics and a trio of cloud-based apps -- are used by successful cybersecurity teams. Find out why. When it comes to cybersecurity, what differentiates highly successful enterprise technology organizations from their less successful counterparts can often be...

Should you be worried about the Chinese Supermicro spy chip revelations? In a nutshell, yes. If you're among the organizations using Supermicro server boards: Run, do not walk, to your server rooms and examine the boards in minute detail. And regardless of what server hardware you use,...

[caption id="attachment_4456" align="aligncenter" width="300"] DevOps is Coming! In character as Paul Revere. Photo by WSTA[/caption] Last month I presented the keynote at an afternoon seminar on Enterprise Architecture held by the Wall St. Technology Association (WSTA). I also moderated a panel session on the topic. Other presenters and...

As adoption of team collaboration applications grows, so do concerns related to governance, retention, and security of conversations stored within them. Organizations, especially those in regulated industries, have spent a great deal of time, money, and effort to build security strategies for their documents, email, and...

The European Union General Data Protection Regulation (GDPR) sets tighter controls on businesses and how they handle customers' personally identifiable information. Read the rest of this tip on SearchUnifiedCommunications.techtarget.com...

HBO has confirmed that the company's internal sites have been broken into, and  that proprietary information (including reportedly scripts of upcoming episodes of the hit series "Game of Thrones") have been seized. According to an article in Variety, “HBO recently experienced a cyber incident, which...

Yeah, I'll admit it: I can be cranky. Very cranky. So when my colleague texted me and asked if I was planning to blog about the WannaCry ransomware attack last week, my response was approximately, "Big whoop. Ransomware happens all the time. People never learn.  I've been...

Although traditional models of separation of duties are incompatible with DevOps, the principle can certainly be applied--and must be, in the long term. Separation of Duties: The Boogieman? Today in an interview for our Cloud and Network benchmark, the IT professional on the other end of the...

"You are in a maze of twisty little passages, all alike." That's the phrase that kept running through my head as the folks from Acalvio prebriefed me on Deception 2.0, the second version of the company's advanced threat defense technology. The basic premise behind the company's...

As UC platforms become more open to the outside world, IT leaders need to heed newer threats, including guest-access features, federation capabilities and cloud services. Nemertes Research, a tech advisory firm, recently interviewed IT security leaders about their top enterprise security concerns and challenges. Unsurprisingly, participants...

[caption id="attachment_2159" align="alignright" width="300"] Darkside economics decouples genius from criminality[/caption] Another day, another ransomware: Security researchers at threat intelligence provider Recorded Future have uncovered Karmen, a ransomware app that is so easy-to-use that novices can set up and run it. Getting started with Karmen costs just...

As pretty much everyone on the planet knows by now, last week when footage of a passenger being forcibly removed from his seat by security at the request of United Airlines went viral, United's stock price imploded, slashing the company's market capitalization by $800 million....