The security benefits of log and machine data analysis are widely accepted by CISOs and CIOs, and yet too many organizations have difficulty executing on this opportunity due to bottlenecks imposed by archaic systems and processes that manage this data. Without the right tools to give easy visibility into the data,...
Enterprises are increasingly adopting Linux as a secure, reliable, and high-performing platform that lowers acquisition and operating costs while providing the agility needed to anticipate and react to changing business conditions.
In particular, the Red Hat Enterprise Linux (RHEL) operating environment, which is...
Datacenters are, and always have been, investments that evolve as the industry changes, new technologies emerge, and application needs change. However, today, datacenter managers are facing a daunting future that may not include any meaningful expansion of their datacenters in terms of floor space, yet their existing...
Prompted by Heartbleed and other vulnerabilities, the White House is giving the Department of Homeland Security authority to conduct regular and proactive scans of federal civilian agency networks.
Undoubtedly, your network is more complex than ever. Your employees are accessing applications, using personal or work devices, but corporate risk and security factors are often ignored. Your business is a target. Are you prepared in the best possible way? The complexity of your network and infrastructure security may...
Until recently, most businesses took a traditional, perimeter-based approach to information security. The thinking was: "If we build a wall high enough, nothing will get in." That was fine until cyber criminals started looking for unguarded cracks in the masonry, forging counterfeit keys for the padlocks and tricking...
When asked to describe the current cyber threat landscape, one of the more balanced and objective answers might be that threats are "hiding in plain sight." Today's advanced cyber threats use applications as their infiltration vector, exhibit application-like evasion tactics, and act as, or
use common network...
Moving to Amazon Web Services (AWS) can offload significant IT resource and cost burdens. However, you can't offload the ultimate responsibility for the security, privacy, and compliance of your data.
This whitepaper delves into an approach to migrate sensitive data into AWS environments while ensuring...
Unix systems face special identity and access management (IAM) challenges.
Read this informative white paper to:
Learn about those issues;
Find out how to overcome them with the right practices and tools;
Enhance security, achieve compliance and improve operational efficiency.
Much of the focus of identity and access management (IAM) is concerned with easy and unobstructed access to a large population of end users with minimal disruption to IT operations. But the forgotten arm of IAM remains privileged account management (PAM).
Read this e-book to:
Discover why PAM can be a prime...
A handful of cybersecurity bills could come up for votes next week in Senate committees. But will the entire Senate get to vote on the measures? No major cybersecurity bill has passed the Senate since 2002.
Continuous monitoring is helping Freddie Mac reduce the number of security controls it uses to safeguard its information systems, says CISO Patricia Titus, who summarizes lessons that can apply to government and private-sector entities.
New guidance from NIST is aimed at helping federal agencies transition from a 14-year-old requirement to a new process that will assure continuously the security of their IT systems.
The Defense Department's plan to adopt NIST's risk management framework. means that, for the first time, defense, intelligence and civilian federal agencies will use the same set of risk management standards.
A problem federal agencies face in deploying effective continuous monitoring is that there's just too much guidance, former federal chief information security officer Patrick Howard says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.