Tag: security management

El Informe de Amenazas de McAfee Labs: Diciembre de 2016 reveló los resultados de una encuesta que midió el estado de los centros de operaciones de seguridad (SOC). El siguiente es un extracto de este artículo. Hace unos años, los SOCs parecían estar siguiendo el camino de los dinosaurios, la era de las grandes salas ...
Read Blog
This week’s McAfee Labs Threats Report: December 2016 revealed the results of a survey gauging the state of the security operations center (SOC). The following is an excerpt from this article. A few years ago, dedicated SOCs seemed to be going the way of the dinosaur—the era of big rooms with big monitors and teams ...
Read Blog
This blog was written by Barbara Kay. In the absence of hard figures, improved threat detection can be difficult to sell to executive management, especially when competing with mandated projects and buzzword-rich initiatives. We’ve created a program that helps CISOs influence and drive urgency through quantifiable business outcomes that speak to organizational goals. Here’s an ...
Read Blog
The Universidad de Las Américas (University of the Americas or UDLAP) in Puebla, Mexico, is one of Latin America’s most prestigious universities. And just like colleges of all sizes across the global, UDLAP recognizes that one of its greatest security threats comes from outside devices connecting to the school’s network via Wi-Fi. The number of ...
Read Blog
As the CISO for Cook County, Ricardo Lafosse has his hands full. In addition to the city of Chicago, Cook County also includes 127 other municipalities and ranks as the second most populous county in the U.S. Keeping such a large county government secure and protected from malware has unique challenges, as Lafosse will attest. ...
Read Blog
This blog was written by Richard Steranka. Today, from Black Hat 2016 in Las Vegas, CompuCom announced the expansion of its Managed Security Services (MSS) through  the release of its upgraded Security Information and Event Management (SIEM) services. In my earlier blog, I spoke about the cyberskills shortage  and the active role that partners can ...
Read Blog
Web security is serious business for this global manufacturer, a maker of a wide and diverse range of industrial and consumer products. To overcome their current IT hurdles, this manufacturer chose a solution that saved them over one million in IT costs, purely from reducing time spent tackling issues. In true David vs. Goliath fashion, ...
Read Blog
This blog was written by Kunal Garg. Server-side request forgery is an attack in which an attacker can force a vulnerable server to trigger malicious requests to third-party servers and or to internal resources. This vulnerability can then be leveraged to launch specific attacks such as a cross-site port attack, service enumeration, and various other ...
Read Blog