Group 440 3

Blog

  • MFA – A requirement, no longer a choice

    MFA – A requirement, no longer a choice

    If you do not have Multi-Factor Authentication (MFA) in place yet, get a move on! If by some chance you have selected this post to read and do not understand MFA let us provide a brief definition. MFA – sometimes known as 2 Factor Authentication – requires users to sign in with two out of…

    Read more: MFA – A requirement, no longer a choice
  • Effective Threat Detection

    Effective Threat Detection

    Threat prevention must always begin with the effective ability to detect threats. Detection must be sweeping and comprehensive if an organization plans to truly understand its risk. As the model for detection continues to shift into ‘threat intelligence’, CISO’s and security teams must understand where these programs excel and where they do not. The issue…

    Read more: Effective Threat Detection
  • Security vs. Functionality

    Security vs. Functionality

    There has long been a sliding rule that says the more secure a solution is, the less usable it becomes. With a boom in the Internet of Things, or “IoT”, many hackers playing with rapid prototyping kits, hacker spaces in every major city, and 3D printing becoming a mainstay in most public areas, we need…

    Read more: Security vs. Functionality
  • Three Common PCI Misperceptions

    Three Common PCI Misperceptions

    With all the negative publicity this year surrounding major-league retailers and their staggering credit card information breaches, it’s no surprise the question of PCI compliance has moved to the front of many a CISO’s minds. And while the PCI Data Security Standard (PCI DSS) has steadily evolved to meet emerging security concerns (currently in its…

    Read more: Three Common PCI Misperceptions
  • Avoid Security Event Overload

    Avoid Security Event Overload

    A great many organizations implement various layers and tools within their security management program – IPS, malware intelligence, spam filtering, firewall logs, Active Directory events, and more – that feed into centralized event correlation engines. This is a great start to a security management program. But how can a security team with limited resources and…

    Read more: Avoid Security Event Overload
  • Cloud Computing – Risky?

    Cloud Computing – Risky?

    The number of articles on cloud computing security risks is growing daily. However, is cloud computing any different than traditional architectures in terms of risk exposure? First, let’s clarify the definition of cloud computing to mean a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the…

    Read more: Cloud Computing – Risky?