Shawn Jaques – BMC Blogs https://www.bmc.com/blogs BMC Software Mon, 19 Nov 2018 12:06:54 +0000 en-US hourly 1 https://blogs.bmc.com/wp-content/uploads/2016/04/bmc_favicon-300x300-150x150.png Shawn Jaques – BMC Blogs https://www.bmc.com/blogs 32 32 Spectre and Meltdown Vulnerabilities: Avoid the War Room https://www.bmc.com/blogs/spectre-and-meltdown-vulnerabilities-avoid-the-war-room-pizza/ Wed, 10 Jan 2018 00:00:57 +0000 http://www.bmc.com/blogs/?p=11719 Researchers have discovered a new way that hackers can potentially exploit systems to expose passwords, keys, and other sensitive data – and this time it involves the physical hardware. (Source: NYTimes) These new vulnerabilities, called Spectre and Meltdown, were discovered in Intel processors, and more specifically the way that the processors anticipate requests and cache […]]]> 4 Key Findings from Forrester Survey on SecOps Maturity https://www.bmc.com/blogs/4-key-findings-from-forrester-survey-on-secops-maturity/ Tue, 21 Nov 2017 08:47:12 +0000 http://www.bmc.com/blogs/?p=11505 Maturity is typically used in the context of a person’s path to adulthood. Do they behave and act as civilized adults according to social norms? Or do they throw tantrums, speak out of turn or lack the decorum to behave appropriately for the situation? We also use maturity to describe the sophistication and completeness of […]]]> Learning from the Equifax Breach https://www.bmc.com/blogs/learning-from-the-equifax-breach/ Wed, 04 Oct 2017 08:30:18 +0000 http://www.bmc.com/blogs/?p=11277 As organizations continue to adopt open source software and cloud technologies, maintaining a secure and compliant environment is getting more challenging. As noted in the WSJ post Out-of-Date Software Creates Incalculable Cyber Risk, even though Equifax was aware of the Apache Struts vulnerability (CVE 2017-5638) and attempted to fix it, there were still critical systems […]]]> Struggling with Security Vulnerabilities? Take the Demo and Find Out How to Close Them Quickly. https://www.bmc.com/blogs/struggling-with-security-vulnerabilities-take-the-demo-and-find-out-how-to-close-them-quickly/ Wed, 27 Sep 2017 10:30:36 +0000 http://www.bmc.com/blogs/?p=11262 You’ve probably noticed that cyber-attacks are making headline news more frequently than ever before and they can wreak havoc on a company’s bottom line. In fact, they’re so prevalent that cybercrime damage costs are expected to hit $6 trillion by 2021, which is double the cost from a year ago.1 Most of the time, hackers […]]]> SecOps Response Service Earns Industry Accolades https://www.bmc.com/blogs/secops-response-service-earns-industry-accolades/ Wed, 23 Aug 2017 09:00:23 +0000 http://www.bmc.com/blogs/?p=11079 As today’s high-risk digital environment drives the need for faster, more effective, and more efficient vulnerability remediation, SecOps Response Service from BMC has earned two recent industry awards validating its success in addressing this critical need. While media headlines tend to focus on newly emerging threats, IT leaders know that most successful attacks target known […]]]> When Timing Is Everything — Integrating SecOps with Operations, Development and ITSM https://www.bmc.com/blogs/timing-everything-integrating-secops-operations-development-itsm/ Fri, 07 Jul 2017 05:35:49 +0000 http://www.bmc.com/blogs/?p=10842 It’s no surprise that when Security and Operations (SecOps) are more closely integrated, they are in a better position to minimize risk and ensure compliance while keeping up with the demands of digital business. For example, when security sends scans of vulnerabilities over to IT Operations for remediation, operations people can more quickly prioritize and […]]]> Event Triage and Remediation Made Easy – Just ask Jerry. https://www.bmc.com/blogs/event-triage-remediation-made-easy-just-ask-jerry/ Tue, 04 Jul 2017 06:30:23 +0000 http://www.bmc.com/blogs/?p=10827 Dealing with the ongoing massive volume of events that arrive daily can be tedious, error-prone, and costly. Just ask “Jerry.” He’s an operator who comes to work each day at 8 a.m., carrying his coffee cup that only gets washed every few days. After all, who has the time to clean a coffee cup when […]]]> 4 Use Cases to Automate the Gap with Service Process Orchestration https://www.bmc.com/blogs/4-use-cases-automate-gap-service-process-orchestration/ Tue, 14 Mar 2017 12:59:45 +0000 http://www.bmc.com/blogs/?p=10266 If you are an IT professional, you probably don’t need convincing of the benefits of automation. In fact, you probably have several tools in your environment that are delivering automation of one form or another right now. For many organizations, enterprise software tools for things such as configuration management, service desk management or IT monitoring […]]]> Cloud Security Trends to Watch in 2017 https://www.bmc.com/blogs/cloud-security-trends-watch-2017/ Fri, 09 Dec 2016 02:00:41 +0000 http://www.bmc.com/blogs/?p=9962 We all know that cloud use keeps getting bigger, which puts greater pressure on organizations to beef up their IT security and achieve greater control over this explosive growth.. How big is this growth? According to a leading industry analyst, the public could services market will grow 17 percent in 2016 and reach $208.6 billion, […]]]> Four Essential Tips for Cloud Security https://www.bmc.com/blogs/four-essential-tips-cloud-security/ Fri, 11 Nov 2016 10:26:49 +0000 http://www.bmc.com/blogs/?p=9916 The frenetic pace and growth of digital business impacts the way companies are using the cloud to reduce costs, increase agility, and deliver services faster.  At the same time, news of security breaches are becoming commonplace, impacting the brand equity of organizations. Security is not only seen as a threat to cloud initiatives – it’s […]]]>