BEDROC

Posts tagged with Security

Date: 1 Mar 2017

Are You Making This Endpoint Security Mistake?

Detecting threats isn’t enough. You must also remediate vulnerable endpoints and employ continuous monitoring to reduce exposure.

To be successful in fortifying your endpoints, you must take steps that complete the security picture by not just detecting threats on the endpoint but also by remediating vulnerabilities, identifying weaknesses, finding unprotected hosts, and continuously monitoring for indications of compromise. Let’s take a look at the benefits of complementing traditional endpoint security with vulnerability management

CONTINUE READING →

Author:

Date: 24 Feb 2017

Tenable i.o: Offering Complete Vulnerability Visibility In the Cloud

 

Tenable launches cloud-based vulnerability management platform

Tenable Network Security is hoping to make vulnerability management great again.

The security vendor, based in Columbia, Md., unveiled a new cloud-based vulnerability management platform, dubbed Tenable.io, this week at RSA Conference 2017. Tenable.io, which is delivered as a software-as-a-service offering, includes an API and software development kit that allows third parties to export and import vulnerability data.

CONTINUE READING →

Author:

Date: 15 Feb 2017

5 lessons IT can learn from ‘Rogue One: A Star Wars Story’

1495805219354014096

Rogue One isn’t just a Star Wars story. It’s an information security story.

“Rogue One: A Star Wars Story” isn’t just a tale of scrappy rebels fighting against an evil Empire. With the issues it raises, including device authentication, asset management, and privilege control, it’s also a story about information security. Well, more like a cautionary tale.

 

CONTINUE READING →

Author:

Date: 7 Dec 2016

It’s like Alexa, but with a little less HAL 9000

voice-recognition-amazon-alexa-640px

Shocker, I’m a Nerd

I grew up LOVING Star Trek: The Next Generation.  One of the key elements of this show was the ship’s computer, LCARS, which could control and interact with various other systems and sensors of the ship on behalf of the crew.  If I had to pinpoint anything in my life that drove me to IT, I think it would have to be how much I enjoyed the idea of the helpful computer in ST:TNG that made people’s lives easier.

CONTINUE READING →

Author:

Date: 18 Mar 2014

Missed FireEye Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It

On Saturday, Nov. 30, the hackers had set their traps and had just one thing to do before starting the attack: plan the data’s escape route. As they uploaded exfiltration malware to move stolen credit card numbers—first to staging points spread around the U.S. to cover their tracks, then into their computers in Russia—FireEye spotted them. Bangalore got an alert and flagged the security team in Minneapolis.

Read more here…

Author:

wp_footer()