In the midst of the digital revolution that is currently underway, bad guys are trying to take advantage and exploit individuals and business alike. No one is immune to cybercrime. In a recent study, out of 1,100 Chief Information Security Officers (CISOs) polled, 68% have experienced a breach, with 26% of those experiencing a breach during the … [Read more...]
SecOps IT Security & Compliance Blog
Delivering effective IT security and compliance means enabling Security and Operations teams to work effectively together. This is how IT can deliver what the business needs: secure and reliable IT services.
Learn about IT Security and Compliance in BMC's complete guide.
Remote shell attacks against password-less systems date back to before the modern Internet era, and allowing root (administrative) users to connect directly using SSH (PermitRootLogon) still catches my attention. We went through similar security challenges with MySQL, which in some default configurations also didn’t require a password for local … [Read more...]
2017 just kicked-off and is expected by many to achieve new records in technology adoption, driven by the transformation of traditional businesses into digital enterprises. While this presents huge opportunities, the threat level has never been so high with cybercrime getting more organized, and derailing the power of new technology. I wanted to … [Read more...]
In the Art of War, legendary strategist Sun Tzu speaks of the necessity of understanding your enemy – not just at a superficial level, but also to know how they think. If you had the chance to pick the brain of a hacker to learn more about how hackers work and what you can do about it, here’s what you would find. This individual – let’s call him … [Read more...]
2016 was a year of surprises. The continued growth of hacking incidents with their devastating trail of destruction was among the more shocking developments. It brought cybersecurity concerns to the center of every conversation. Many an IT executive has suffered sleepless nights as they tried to figure out how they could protect their … [Read more...]
If your IT organization is like most enterprises, you’ve seen how the demands of digital business put greater pressure on the service desk to become more efficient and responsive, while continuing to drive down costs. Plus, you have to do all of this at a time when hacking is on the rise and threatens the business. While self-service and … [Read more...]
If you’re like most people, you probably lock the doors of your home or apartment when you’re not there. It’s easy to do, is a cultural norm, and reduces the chance of having a criminal break in. It’s a standard practice that leaves you less vulnerable to intruders. Now, take that same thought and apply it to protecting the enterprise. As digital … [Read more...]
We all know that cloud use keeps getting bigger, which puts greater pressure on organizations to beef up their IT security and achieve greater control over this explosive growth.. How big is this growth? According to a leading industry analyst, the public could services market will grow 17 percent in 2016 and reach $208.6 billion, with IT … [Read more...]
IT environments are changing all the time Business today drives frequent application changes, which typically means infrastructure changes, such as new configurations, new servers, new application servers, new open source or commercial libraries, network route and port changes, and so on. Understanding the impact of these high-velocity, broad … [Read more...]
Another day another headline about a security breach. Organizations both public and private are under attack by an enemy who is well resourced, highly motivated, and hidden from view. In today’s digital world where everything has to be accessible, how can organizations mitigate the risks that hackers, vulnerabilities, unidentified systems and … [Read more...]