Shawn Jaques – BMC Blogs https://www.bmc.com/blogs BMC Software Sat, 18 Aug 2018 05:12:20 +0000 en-US hourly 1 https://blogs.bmc.com/wp-content/uploads/2016/04/bmc_favicon-300x300-150x150.png Shawn Jaques – BMC Blogs https://www.bmc.com/blogs 32 32 Spectre and Meltdown Vulnerabilities: Avoid the War Room https://www.bmc.com/blogs/spectre-and-meltdown-vulnerabilities-avoid-the-war-room-pizza/ Wed, 10 Jan 2018 00:00:57 +0000 http://www.bmc.com/blogs/?p=11719 Researchers have discovered a new way that hackers can potentially exploit systems to expose passwords, keys, and other sensitive data – and this time it involves the physical hardware. (Source: NYTimes) These new vulnerabilities, called Spectre and Meltdown, were discovered in Intel processors, and more specifically the way that the processors anticipate requests and cache […]]]> 4 Ways to Reduce the Pain of Multi-Cloud Compliance – Take the Trial and Learn How https://www.bmc.com/blogs/4-ways-to-reduce-the-pain-of-multi-cloud-compliance-take-the-trial-and-learn-how/ Tue, 28 Nov 2017 13:12:58 +0000 http://www.bmc.com/blogs/?p=11504 Staying ahead of the competition in digital business means that companies must continually innovate and deliver improved services and products to the market. The speed and agility of public cloud has proven to be a cost effective, flexible platform, but it has brought with it new security challenges. The cloud has matured and can be […]]]> 4 Key Findings from Forrester Survey on SecOps Maturity https://www.bmc.com/blogs/4-key-findings-from-forrester-survey-on-secops-maturity/ Tue, 21 Nov 2017 08:47:12 +0000 http://www.bmc.com/blogs/?p=11505 Maturity is typically used in the context of a person’s path to adulthood. Do they behave and act as civilized adults according to social norms? Or do they throw tantrums, speak out of turn or lack the decorum to behave appropriately for the situation? We also use maturity to describe the sophistication and completeness of […]]]> Learning from the Equifax Breach https://www.bmc.com/blogs/learning-from-the-equifax-breach/ Wed, 04 Oct 2017 08:30:18 +0000 http://www.bmc.com/blogs/?p=11277 As organizations continue to adopt open source software and cloud technologies, maintaining a secure and compliant environment is getting more challenging. As noted in the WSJ post Out-of-Date Software Creates Incalculable Cyber Risk, even though Equifax was aware of the Apache Struts vulnerability (CVE 2017-5638) and attempted to fix it, there were still critical systems […]]]> Struggling with Security Vulnerabilities? Take the Demo and Find Out How to Close Them Quickly. https://www.bmc.com/blogs/struggling-with-security-vulnerabilities-take-the-demo-and-find-out-how-to-close-them-quickly/ Wed, 27 Sep 2017 10:30:36 +0000 http://www.bmc.com/blogs/?p=11262 You’ve probably noticed that cyber-attacks are making headline news more frequently than ever before and they can wreak havoc on a company’s bottom line. In fact, they’re so prevalent that cybercrime damage costs are expected to hit $6 trillion by 2021, which is double the cost from a year ago.1 Most of the time, hackers […]]]> SecOps Response Service Earns Industry Accolades https://www.bmc.com/blogs/secops-response-service-earns-industry-accolades/ Wed, 23 Aug 2017 09:00:23 +0000 http://www.bmc.com/blogs/?p=11079 As today’s high-risk digital environment drives the need for faster, more effective, and more efficient vulnerability remediation, SecOps Response Service from BMC has earned two recent industry awards validating its success in addressing this critical need. While media headlines tend to focus on newly emerging threats, IT leaders know that most successful attacks target known […]]]> When Timing Is Everything — Integrating SecOps with Operations, Development and ITSM https://www.bmc.com/blogs/timing-everything-integrating-secops-operations-development-itsm/ Fri, 07 Jul 2017 05:35:49 +0000 http://www.bmc.com/blogs/?p=10842 It’s no surprise that when Security and Operations (SecOps) are more closely integrated, they are in a better position to minimize risk and ensure compliance while keeping up with the demands of digital business. For example, when security sends scans of vulnerabilities over to IT Operations for remediation, operations people can more quickly prioritize and […]]]> Event Triage and Remediation Made Easy – Just ask Jerry. https://www.bmc.com/blogs/event-triage-remediation-made-easy-just-ask-jerry/ Tue, 04 Jul 2017 06:30:23 +0000 http://www.bmc.com/blogs/?p=10827 Dealing with the ongoing massive volume of events that arrive daily can be tedious, error-prone, and costly. Just ask “Jerry.” He’s an operator who comes to work each day at 8 a.m., carrying his coffee cup that only gets washed every few days. After all, who has the time to clean a coffee cup when […]]]> 4 Use Cases to Automate the Gap with Service Process Orchestration https://www.bmc.com/blogs/4-use-cases-automate-gap-service-process-orchestration/ Tue, 14 Mar 2017 12:59:45 +0000 http://www.bmc.com/blogs/?p=10266 If you are an IT professional, you probably don’t need convincing of the benefits of automation. In fact, you probably have several tools in your environment that are delivering automation of one form or another right now. For many organizations, enterprise software tools for things such as configuration management, service desk management or IT monitoring […]]]> Enterprise Strategy Group Tests & Validates BMC’s Cloud Management Platform https://www.bmc.com/blogs/results-enterprise-strategy-group-tests-validates-benefits-bmcs-cloud-management-platform/ Wed, 01 Feb 2017 05:10:35 +0000 http://www.bmc.com/blogs/?p=10130 You’ve heard a lot about the benefits of cloud computing and how it can help organizations improve agility, reduce capital costs, and move to a more efficient infrastructure.  At the same time, you may wonder if the claims made by vendors for solutions that manage the cloud are really true and whether your organization will […]]]>