Security strategy News
June 23, 2017
This week, bloggers look into how to manage asymmetrical network traffic flows, Broadcom Trident telemetry and cloud security as part of a data protection strategy.
June 13, 2017
Recently, SearchSecurity editorial director Robert Richardson checked in with (ISC)2's CEO David Shearer as the organization prepares for its fall Security Congress.
May 07, 2017
Keeping anything safe and secure involves multiple considerations. Avoid putting yourself in danger, put up a protective ‘shield’, detect when that is compromised, take mitigating action. When it ...
May 02, 2017
The NATO Locked Shields cyberwar games had the U.S. team winning most improved, but experts say the U.S. still needs more practice.
Security strategy Get Started
Bring yourself up to speed with our introductory content
Risks abound, and no amount of preparation or caution will eliminate them entirely from our lives. This is as true now as it was in the past, and it likely will remain true in the future.
While technology enables us all to work more effectively and productively, the necessity of managing IT risk remains. Risk follows wherever we go -- from the data center to the cloud, from virtualized workloads to containers. Smart IT organizations are continuously assessing threats and then devising ways to minimize them. That's the goal, at least.
This issue of Modern Infrastructure examines some of the current approaches to managing IT risk, from maintaining security to handling costs.
In our cover story, TechTarget's Beth Pariseau writes about the particular challenges of container security. IT shops have been reluctant to put containers in production in large part because of the uncertainty about how secure they might be. Updates from Docker and more disciplined app development practices are making containers less risky, Pariseau writes. And there's reason to think that containers could be even more secure than VMs.
Getting comfortable with containers is a process not unlike how technology professionals learned how to safely use cloud services. It takes some time and effort, but managing IT risk can bring exciting and powerful new tools safely into the fold.Continue Reading
This Security School explores how threat intelligence feeds works and discusses the types of vendor services that exist now. Continue Reading
A system breach is inevitable, and BDS products provide a valuable means of detection. But a strategy that blends both defense and offense is the best approach to security. Continue Reading
Evaluate Security strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The cybersecurity discussion about best-of-breed point products vs. integrated security architectures is one of many enduring tech debates; this handbook aims to frame the dialogue. Continue Reading
Channel partners can make arguments for the integrated security suite and the best-in-class point product method, but the decision ultimately rests on a customer's specific needs. Continue Reading
In this Essential Guide, learn how to deal with increasing cyberthreats and discover best practices for developing a successful IT security strategy. Continue Reading
Manage Security strategy
Learn to apply best practices and optimize your operations.
Modern threats have made traditional information security apparatuses obsolete, but new, tech-centric data security models are helping companies safeguard their digital assets. Continue Reading
Businesses must treat IoT devices in a manner similar to how they treat any other asset. Here are four steps they can take to boost their defenses. Continue Reading
As mobile security threats arise, the need for identity management systems becomes more and more crucial. The right tools help IT protect company data and users alike. Continue Reading
Problem Solve Security strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Take a software security architectural approach to overcome WannaCry-era hackers. An IT security pro describes tactics, frameworks and best practices for fighting new software threats. Continue Reading
Healthcare organizations can complement their existing security tools and strategies by providing security awareness training to employees to further protect against attacks. Continue Reading
As companies struggle to protect constantly expanding attack surfaces, virtual containers could quickly become essential to companies' endpoint security strategy. Continue Reading