Salted Hash has been covering the topic of threat intelligence from the show floor during the RSA conference all week. Today's post will feature a Q&A on the subject with Brian Martin, Director of Vulnerability Intelligence for Risk Based Security. Read More ▶ |
|
| White Paper: Brocade Communications Systems Inc While business-critical workloads are very difficult to predict -- the one certainty is that they are increasing. This study shows how improving app workload performance reduces downtime, and makes for happier customers and more efficient staff. Read More ▶ | CSOs would be wise to follow Google’s security operations and strategies because the engineering resources and scale will illuminate pending threats and evolving defenses. Read More ▶ |
| The endless complexity of the Internet of Things extends to legislative and regulatory efforts to manage its security. A legal panel at the RSA conference said effective standards and management of legal liability issues are likely years away. Read More ▶ |
| Threat intelligence is a hot topic, but it requires a ton of work to be operational and effective. Here's how to steer clear of the traps Read More ▶ |
| | In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known vulnerabilities, endpoint patch management is the front line of network security. This article will review the common excuses for poor patch practices, and offer specific suggestions for improvement. Read More ▶ |
| Amazon caught flack on Wednesday for disabling the encryption capabilities of its Fire phones and tablets with a software update. The company says its reasoning was simple: people didn't use it. Read More ▶ |
| At the 2016 RSA Conference, Network World's Tim Greene chats with Bryan Sartin, a director at Verizon, about its new Data Breach Digest, and the insights it offers to enterprises looking to protect their systems. Watch Now ▶ |
| Video/Webcast: Ixia Reduce your attack surface with a security solution that sits in front of other security devices to provide dual-function protections: 1) Blocks traffic from known IP addresses; and 2) Blocks outbound bot communication from pre-existing infections. Read More ▶ | Editor's Picks |
|
|
|