Skip to main content

Posts

Showing posts from 2014

Remote Management Services: Rethinking the Way You Manage and Operate IT

Remote Management Services: Rethinking the Way You Manage and Operate IT Just a few short years ago, if your car broke down, you would automatically take it to your local mechanic who would identify the issue and fix it. Fast forward to 2013 – today we live in an era where our cars tell   US when there is a potential issue or it needs a service and, more often than not, they just don’t break down at all. We’ve gone from a reactive, break-fix model to a proactive and, sometimes, even a pre-emptive approach, or warranty as they call it. It’s the technology – specifically the software embedded in our cars and the software that supports and maintains it from the manufacturer – that has fundamentally changed this industry. There is a similar shift happening in IT. Customer care-abouts are evolving from simply, “make my technology work” to “make my business better.” Drivers such as   cloud   and   mobility   are causing us to pause and rethink our traditional ...

Security Bloggers Network Social Security Awards 2014 Finalists Announced

This year, award winners will be recognized in multiple categories, including Best Corporate Security Blog, Best Security Blog, Most Educational Security Blog, Most Entertaining Security Blog, Blog that Best Represents the Security Industry, Single Best Blog or Podcast of the Year, The Security Bloggers Hall of Fame and Best New Security Blog. This year's sponsors include Kaspersky Lab,    Sourcefire (now part of Cisco), Akamai, Fortinet, Tripwire, Barracuda Networks, Qualys, RSA Conference and Trainer Communications Nominees this year are Juniper Networks: Security & Mobility Now , Norse , RedSeal Networks , Solutionary: Minds , VioPoint , WhiteHat Security , TripWire: The State of Security , Veracode , Mandiant: M-unition , Fortinet , F-SECURE , Trend Micro TrendLabs Security Intelligence , Kaspersky Lab: Securelist , Akamai , Bit9 , IOActive , SANS: Daily Internet Storm Center Stormc...

FIM QQ

How many systems will need to be monitored with FIM? Which type of architecture will need to be deployed? Which Operating Systems will require monitoring? Does your environment leverage central configuration management? How will FIM alerts be evaluated? Does FIM logs to be sent to a centralized log repository? Who will monitor and approve changes for FIM?  What reports should be developed and who should receive these?  Is FIM required to meet regulatory or standards requirements? How will FIM be tuned and who will be responsible for identifying new FIM signatures? Will a SIEM solution be utilized within the environment? Do you have any PCI DSS requirements? Do you process, store, or forward credit card information? Do you have a compliance need to test and verify the security of your systems? How do you know if the security measures in place are working? Can you verify that you will know if file or object-level changes occur accurately...

Tips and Guidelines for Sizing Your Information Security Organization

There is no magic formula for CIOs and security leaders when assessing the right size of a security team. Factors that influence the team size team include the work it must do, the distribution of responsibility, the extent of the risks the team manages and available resources. ·            Analysis o     Understand the Challenges Inherent in Sizing a Security Function o     Define the Primary Roles of the Security Team o     Consider What Other Organizations Are Doing o     Assess Your Staffing Levels Against the Comparative Ratios §   It Is Important to Remember the Limitations of Using Comparative Data

Digital Business Forever Changes How Risk and Security Deliver Value

Mobile, social, cloud and big data, each a disruptive force, together change everything related to protecting systems and information. CROs, CISOs and other risk and security professionals must use the power of risk management and security to deliver value, and to influence business decision making. Table of Contents ·          Introduction ·          Analysis o     Reset Your Approach to Risk and Security , Balancing the Need to Protect the Organization and the Need to Run the Business o     Assess and Prioritize Risks to Support Conscious Choices About What Will — and Will Not — Be Done to Address Threats §   Scenario Planning for Threats o     Understand and Communicate the Impact IT Risk Has on Business Outcomes o     Accept the Limitations of Technology to Protect the Organization o     Stop Being a Rule ...

SOC Services

Managed Security Services Log Monitoring Log Management Security Device Management Vulnerability Management Security Consulting Services Web Application Security:  Log Monitoring provides advanced web application monitoring. In addition, the Vulnerability Management service provides a Managed Application Assessment capability that leverages both commercial and proprietary application vulnerability assessment tools with self-service capabilities that can be integrated into existing development cycles. PCI Compliance:  PCI QSAC (Qualified Security Assessment Company) with a large staff of PCI QSAs (Qualified Security Assessors).  Log Monitoring, Log Management, Vulnerability Management and Security Device Management services address many of the PCI DSS requirements. Retail Store Solutions: Log Monitoring can be implemented for retail store based UTM devices as well as POS systems with specific service levels designed to meet PCI compliance...

CIO Involvement in Operational Technology Vendor Risk Management Mitigates Security Vulnerabilities

Accountability for risk management of operational technology vendors is often unclear, but IT components imbedded in OT can potentially disrupt critical production processes. CIOs must get involved to help mitigate the immature software life cycles and security management processes of OT vendors. Table of Contents ·          Analysis o     When Should a CIO Consider Getting Involved in Managing OT Vendor Risk? §   Key Intrusion Examples ·          Impacts and Recommendations o     OT vendors lack experience in addressing software life cycle and security management processes, and consequently introduce vulnerabilities to enterprises — CIOs are uniquely positioned to help manage these vendor risks across the entire IT/OT spectrum o     Issues around authority, organizational boundaries and lack of trust between CIOs and operations/engineering te...

What Securing the Internet of Things Means for CISOs

Summary The Internet of Things redefines security by expanding the scope of responsibility into new platforms, services and directions. CISOs should focus existing security resources on specific use cases to identify new patterns for Internet of Things security solutions. Table of Contents ·          Analysis ·          Impacts and Recommendations o     The power of an IoT object to change the state of environments — in addition to generating information — will cause CISOs to redefine the scope of their security efforts beyond present responsibilities o     Most IoT devices and services may be Nexus of Forces-based, but CISOs will be dealing simultaneously with all past eras of technology to secure the necessary scale and complexity that an IoT world demands o     IoT security needs will be driven by specific business uses cases that are resistant ...