In the Art of War, legendary strategist Sun Tzu speaks of the necessity of understanding your enemy – not just at a superficial level, but also to know how they think. If you had the chance to pick the brain of a hacker to learn more about how hackers work and what you can do about it, here’s what you would find. This individual – let’s call him … [Read more...]
SecOps IT Security & Compliance Blog
Delivering effective IT security and compliance means enabling Security and Operations teams to work effectively together. This is how IT can deliver what the business needs: secure and reliable IT services.
Learn about IT Security and Compliance in BMC's complete guide.
2016 was a year of surprises. The continued growth of hacking incidents with their devastating trail of destruction was among the more shocking developments. It brought cybersecurity concerns to the center of every conversation. Many an IT executive has suffered sleepless nights as they tried to figure out how they could protect their … [Read more...]
If your IT organization is like most enterprises, you’ve seen how the demands of digital business put greater pressure on the service desk to become more efficient and responsive, while continuing to drive down costs. Plus, you have to do all of this at a time when hacking is on the rise and threatens the business. While self-service and … [Read more...]
If you’re like most people, you probably lock the doors of your home or apartment when you’re not there. It’s easy to do, is a cultural norm, and reduces the chance of having a criminal break in. It’s a standard practice that leaves you less vulnerable to intruders. Now, take that same thought and apply it to protecting the enterprise. As digital … [Read more...]
We all know that cloud use keeps getting bigger, which puts greater pressure on organizations to beef up their IT security and achieve greater control over this explosive growth.. How big is this growth? According to a leading industry analyst, the public could services market will grow 17 percent in 2016 and reach $208.6 billion, with IT … [Read more...]
IT environments are changing all the time Business today drives frequent application changes, which typically means infrastructure changes, such as new configurations, new servers, new application servers, new open source or commercial libraries, network route and port changes, and so on. Understanding the impact of these high-velocity, broad … [Read more...]
Another day another headline about a security breach. Organizations both public and private are under attack by an enemy who is well resourced, highly motivated, and hidden from view. In today’s digital world where everything has to be accessible, how can organizations mitigate the risks that hackers, vulnerabilities, unidentified systems and … [Read more...]
In 2015, headlines were riddled with reports of large scale cyberattacks stealing everything from government secrets to children’s birthdays. IT Executives cringed as they wondered what the chances were that they would be next. In 2016 the horror show continues as hospital systems are held hostage by ransomware, and every day more vulnerabilities … [Read more...]
In the business world, you don’t have to worry about zombies wandering the halls of accounting or hiding in the closets of the legal department. But there’s a good chance you’ll find at least a few of them in IT. I’m not referring to the reanimated dead depicted in popular TV series such as The Walking Dead. I’m talking about zombie servers lurking … [Read more...]
In 2015, headlines were riddled with reports of large scale hacking attacks stealing everything from government secrets to children’s birthdays and toy profiles. IT Executives cringed as they wondered what the chances were that they would be next. In 2016, as leaders, we need to resolve to take control of the issues so we can protect our … [Read more...]