April 14, 2017
This Symmetry roundup explores Gartner's 2017 IT spending forecast, Agile strategy and challenges and mobile compliance.
February 23, 2017
Nexsan Unity arrays integrate optional secure compliance archive for petabytes of unstructured data. Data files written to primary storage are immediately copied to the archive.
February 01, 2017
Thanks to a polarizing election, the potential ramifications of cybersecurity attacks are front and center. Your friends and relatives probably have some concept of what it is that you actually do and its importance. But the daily challenges of protecting most enterprise environments is less like The Americans than they might think. Still, it's exciting. In this issue of Information Security magazine, we look at the incoming threats in 2017 and some countermeasures that can help your organization bolster its defenses.
Last year, we saw the internet of things used as a beachhead in larger cybersecurity attacks. Many devices now use cloud-based systems to communicate. They regularly send status updates to the cloud server and retrieve new commands to execute. Weak and incorrectly implemented authentication between device and cloud is often the point of failure that can be exploited to either attack the cloud infrastructure or the device. So far, destructive attacks are not common and are mostly limited to distributed denial-of-service attacks, which do not cause permanent damage. But future attacks, if they are combined with ransom demands, may destroy devices intentionally.
Breaches of cloud storage that modify data instead of just "stealing" it and vulnerabilities in microservices environments are other areas in which attackers may get more leverage. With the emergence of cloud-based microservices, this problem will only become worse. Instead of including a library in software shipped to clients, the software now relies on cloud-based web services to perform certain functions. We look at what is coming next and ways to mitigate these cybersecurity attacks.
November 11, 2016
Adobe agreed to pay several states a total of $1 million and agreed to new compliance measures as part of a settlement over the company's 2013 data breach.
Compliance Get Started
Bring yourself up to speed with our introductory content
In this excerpt from chapter nine of Building a Practical Information Security Program, authors Jason Andress and Mark Leary discuss deploying a security compliance process. Continue Reading
SysOps teams must maintain consistent workload performance, meet compliance and security standards, as well as other IT tasks. AWS Config helps admins keep a watchful eye on apps. Continue Reading
Legal concerns can hinder the mobility strategy of companies, but designing compliance into the front end of mobile technology development will keep both regulators and CIOs satisfied. Continue Reading
Evaluate Compliance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Human resources departments initially might have lagged in moving management functions to the cloud, but adoption of the technology is gathering momentum. Continue Reading
In order to predict what 2017 holds for Oracle licensing, a look to the company's past can help reveal where it's headed -- and that means more pressure on users to go to the cloud. Continue Reading
Because of their lightweight nature, 3D printed braces can help improve patient compliance in the group most affected by scoliosis -- adolescent females. Continue Reading
Learn to apply best practices and optimize your operations.
With the portability of tapes and the ability to store terabytes of data on a single cartridge, appropriate security of tape backup storage is imperative. Continue Reading
Microsoft's Office 365 reporting tool gives administrators flexibility with how reports are generated and ways to monitor the consumption of the cloud platform. Continue Reading
For many organizations, the public cloud is a way to cut costs -- but some apps may be costing you more in the cloud than you think. Find out which enterprise apps are better left on premises. Continue Reading
Problem Solve Compliance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Wi-Fi security could be in for a change, thanks to newly proposed FCC compliance rules. Expert Kevin Beaver explains what enterprises need to know about the FCC's proposal. Continue Reading
Checking for configuration compliance is a time-consuming job, but administrators need to make sure virtual desktops don't drift too far away from their organization's preferred settings. Continue Reading
Secure your email with EOP tools like DKIM and DMARC that verify incoming messages aren't spam or spoofs. Avoid unauthorized email with digital signatures and authenticated domains. Continue Reading