Eric Schou is a Group Product Marketing Manager at McAfee. He is currently a part of the Security Management Group. Before joining McAfee, Schou spent more than 15 years in the security and storage industry.
“Big security data” consists of data sets that grow so massive that they become awkward to work with using the database management tools that you have on hand. A few extra gigabytes here and terabytes there, and before you know it, you've got a big security data problem.
Ever wonder why Frederick the Great was called Frederick the Great? He was smart enough to identify immediate threats, concentrate his forces, and move effectively against one enemy at a time. What relevance does this has to enterprise security?
Walking the tightrope between data security and the desire for maximum performance is a high-wire act well known to many organizations. Their search for the right mix now prompts them to find the best way to identify users tapping into sensitive databases, while minimizing impact on performance.
Cars have become sophisticated mobile computers. And like all computers, automobiles can be hacked and compromised. Interconnectedness with other embedded systems and cellular networking or Internet connectivity can also introduce security flaws that may become exploitable.
While organizations understand the stakes involved in leaving their systems un-patched, quite often they do not install patches in a timely manner. Is there a convenient and reliable way to bridge this gap?
Hardening your IT infrastructure has its rewards. Application control and change control can go a long way, by providing the defense-in-depth you need to guard against increasingly sophisticated security threats.
Enterprises are aware of the rich benefits of cloud computing and virtualized environments but anxious about the exposure of sensitive data through computing resources no longer under their physical control. Can sensitive data be safely deployed in the cloud?
The recent LizaMoon SQL Injection Attack affected thousands of databases over the course of the past several months. How virtual patching can take the pain out of defending against SQL injection attacks like LizaMoon.
It seems everyone is after corporate data today: cyberthugs, morally corrupt competitors, and even rogue nations seeking cutting-edge intellectual property or state secrets. And every day, these threats grow in number and sophistication.
Now that the holiday crunch is over, it’s a good time to take stock of where your business is with regard to PCI compliance. Make a plan—a resolution, if you will—to take a larger, more holistic approach to managing compliance.
Successfully managing security and compliance is difficult in any sized organization, but universally most people will suggest the place to start is by getting a detailed understanding of the standards and regulations that affect you.