-

MFA – A requirement, no longer a choice
Read more: MFA – A requirement, no longer a choiceIf you do not have Multi-Factor Authentication (MFA) in place yet, get a move on! If by some chance you have selected this post to read and do not understand MFA let us provide a brief definition. MFA – sometimes known as 2 Factor Authentication – requires users to sign in with two out of…
-

Effective Threat Detection
Read more: Effective Threat DetectionThreat prevention must always begin with the effective ability to detect threats. Detection must be sweeping and comprehensive if an organization plans to truly understand its risk. As the model for detection continues to shift into ‘threat intelligence’, CISO’s and security teams must understand where these programs excel and where they do not. The issue…
-

Security vs. Functionality
Read more: Security vs. FunctionalityThere has long been a sliding rule that says the more secure a solution is, the less usable it becomes. With a boom in the Internet of Things, or “IoT”, many hackers playing with rapid prototyping kits, hacker spaces in every major city, and 3D printing becoming a mainstay in most public areas, we need…
-

Three Common PCI Misperceptions
Read more: Three Common PCI MisperceptionsWith all the negative publicity this year surrounding major-league retailers and their staggering credit card information breaches, it’s no surprise the question of PCI compliance has moved to the front of many a CISO’s minds. And while the PCI Data Security Standard (PCI DSS) has steadily evolved to meet emerging security concerns (currently in its…
-

Avoid Security Event Overload
Read more: Avoid Security Event OverloadA great many organizations implement various layers and tools within their security management program – IPS, malware intelligence, spam filtering, firewall logs, Active Directory events, and more – that feed into centralized event correlation engines. This is a great start to a security management program. But how can a security team with limited resources and…
-

Cloud Computing – Risky?
Read more: Cloud Computing – Risky?The number of articles on cloud computing security risks is growing daily. However, is cloud computing any different than traditional architectures in terms of risk exposure? First, let’s clarify the definition of cloud computing to mean a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the…
