Allison Cramer – BMC Blogs http://www.bmc.com/blogs BMC Software Wed, 22 Nov 2017 13:21:43 +0000 en-US hourly 1 http://blogs.bmc.com/wp-content/uploads/2016/04/bmc_favicon-300x300-150x150.png Allison Cramer – BMC Blogs http://www.bmc.com/blogs 32 32 How Changes to the EU’s General Data Protection Regulation Impact Your Business http://www.bmc.com/blogs/changes-eus-general-data-protection-plan-regulation-impact-business/ Thu, 15 Jun 2017 09:38:17 +0000 http://www.bmc.com/blogs/?p=10709 The clock is ticking As digital business expands and consumers increase their online activities, protecting privacy and ensuring security is more important than ever. The EU General Data Protection Regulation (GDPR) becomes effective in May 2018, with new regulations to meet these challenges. If you conduct business with EU customers, you’ll need to comply with […]]]> 10 Surprising Findings about Operationalizing Security http://www.bmc.com/blogs/10-surprising-findings-operationalizing-security/ Mon, 05 Jun 2017 14:00:48 +0000 http://www.bmc.com/blogs/?p=10451 The news headlines and social media comments about IT security vulnerabilities remain consistent – and they may cause you to take a closer look at what can be done to protect your organization. It seems like “another day, another data breach, another cyber attack, and another failed security audit.” Fortunately, there are steps you can […]]]> Vulnerability Remediation – to the Cloud and Beyond! http://www.bmc.com/blogs/tackling-vulnerability-remediation-across-multiple-platforms-bmc-secops-response-service/ Wed, 03 May 2017 09:29:20 +0000 http://www.bmc.com/blogs/?p=10425 Understanding and managing risk Security teams often use a variety of vulnerability management and response tools to assess and address the vulnerability situation across the organization, frequently using different sets of tools for different environment types.   This often makes getting a single picture of the current risk profile difficult as they try to stitch together […]]]> Confessions of a “Hacker” and How to Protect Your Enterprise http://www.bmc.com/blogs/confessions-hacker-protect-enterprise/ Thu, 19 Jan 2017 04:38:02 +0000 http://www.bmc.com/blogs/?p=10046 In the Art of War, legendary strategist Sun Tzu speaks of the necessity of understanding your enemy – not just at a superficial level, but also to know how they think. If you had the chance to pick the brain of a hacker to learn more about how hackers work and what you can do […]]]> The Service Desk Just Became Even More Powerful and Secure http://www.bmc.com/blogs/service-desk-just-became-even-powerful-secure/ Thu, 05 Jan 2017 01:27:55 +0000 http://www.bmc.com/blogs/?p=10045 If your IT organization is like most enterprises, you’ve seen how the demands of digital business put greater pressure on the service desk to become more efficient and responsive, while continuing to drive down costs. Plus, you have to do all of this at a time when hacking is on the rise and threatens the […]]]> 6 Reasons Why Cyber Crime Is Increasing – And What You Can Do About It http://www.bmc.com/blogs/6-reasons-cyber-crime-increasing-can/ Mon, 12 Dec 2016 01:08:08 +0000 http://www.bmc.com/blogs/?p=9955 If you’re like most people, you probably lock the doors of your home or apartment when you’re not there. It’s easy to do, is a cultural norm, and reduces the chance of having a criminal break in. It’s a standard practice that leaves you less vulnerable to intruders. Now, take that same thought and apply […]]]>