DevOps

Security costs News

View All News

Security costs Get Started

Bring yourself up to speed with our introductory content

  • The art of managing IT risk is never quite mastered

    Risks abound, and no amount of preparation or caution will eliminate them entirely from our lives. This is as true now as it was in the past, and it likely will remain true in the future.

    While technology enables us all to work more effectively and productively, the necessity of managing IT risk remains. Risk follows wherever we go -- from the data center to the cloud, from virtualized workloads to containers. Smart IT organizations are continuously assessing threats and then devising ways to minimize them. That's the goal, at least.

    This issue of Modern Infrastructure examines some of the current approaches to managing IT risk, from maintaining security to handling costs.

    In our cover story, TechTarget's Beth Pariseau writes about the particular challenges of container security. IT shops have been reluctant to put containers in production in large part because of the uncertainty about how secure they might be. Updates from Docker and more disciplined app development practices are making containers less risky, Pariseau writes. And there's reason to think that containers could be even more secure than VMs.

    Getting comfortable with containers is a process not unlike how technology professionals learned how to safely use cloud services. It takes some time and effort, but managing IT risk can bring exciting and powerful new tools safely into the fold.

     Continue Reading

  • Is threat hunting the next step for modern SOCs?

    The emergence of threat hunting programs underscores the importance of the human factor in fighting the most dangerous and costly security threats. Continue Reading

  • An IT security strategy guide for CIOs

    In this Essential Guide, learn how to deal with increasing cyberthreats and discover best practices for developing a successful IT security strategy. Continue Reading

View All Get Started

Evaluate Security costs Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Security costs

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security costs Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Seven supply chain risk factors that affect assessment, mitigation

    Over the years, managing supply and demand has become increasingly complicated. Here's a look at factors that influence today's supply chain risk assessments. Continue Reading

  • How did firmware create an Android backdoor in budget devices?

    An Android backdoor was discovered in the Ragentek firmware used in almost three million low-cost devices. Expert Michael Cobb explains how to prevent attacks on affected devices. Continue Reading

  • Machine learning in security explodes: Does it work?

    Machine learning in security is continuing to advance, and many companies now claim to have introduced artificial intelligence techniques into their platforms. With the high volume of data that most security teams have to prioritize, machine learning in security technology is increasingly being adopted as a way to reduce the noise that traditional security products produce.

    Smaller companies, such as Keen Footwear, have turned to threat platforms that incorporate machine learning and AI techniques -- and soon automated defense -- to solve a variety of problems. "I don't need to go hire someone dedicated to security," said Clark Flannery, director of IT at Keen's headquarters in Portland, Ore. "It just feels like a whole team back there -- who are way more qualified than [staff] I would be able to pay."

    With security professionals in short supply, companies like Keen are relying on these technologies to make it easier to spot and respond to attacks. While machine learning and artificial intelligence are often used interchangeably, the concepts are different. In this issue of Information Security magazine, we discuss the nuances and dive into the current state of the technology. Machine learning in security offers information security analysts more depth of knowledge, helping to detect patterns and related analysis they may not otherwise have known about.

     Continue Reading

View All Problem Solve