The sad truth is that the security practice lags behind pretty much every other IT discipline when it comes to automation. • Need to...
Hi, what are you looking for?
The sad truth is that the security practice lags behind pretty much every other IT discipline when it comes to automation. • Need to...
Recent headlines around data breaches have highlighted a common security mishap – improper network segmentation.
Most Organizations Lack the Tools and Processes to Assess and Prioritize Risks and Vulnerabilities from the Business Perspective...
Since the initial release of PCI-DSS, networks, data centers and threats to cardholder data have continued to evolve, driving further refinement of the standard....
According to a recent survey (PDF) of 240 information security professionals around the globe, network operations and applications owners to determine how security management affects organizations’...
As the first layer of defense in your network, it is important to take a step back and review the design of your perimeter...
The DevOps movement seeks to improve the integration of development and operations teams with the ultimate goal of accelerating the delivery of critical applications....
Most large organizations are not quite ready to accept the security implications of renting unknown machines from public cloud providers, but transforming data centers...
In my previous SecurityWeek column, I wrote about Managing Security with the Business in Mind and discussed briefly the importance of taking an application-centric...
Today’s businesses must be able to rapidly adapt to changing market conditions – to support a new venture, merger/acquisition, etc. As business needs change,...
This month has been a big one in terms of new research and survey data, including AlgoSec’s State of Network Security 2013 as well...
The firewall – it’s been around since the dawn of the commercial internet, but it has been and remains a vital layer in the...