SecOps IT Security & Compliance Blog

Delivering effective IT security and compliance means enabling Security and Operations teams to work effectively together. This is how IT can deliver what the business needs: secure and reliable IT services.

Learn about IT Security and Compliance in BMC's complete guide.

How to Make WannaCry a Non-event: Ransomware’s Got Nothing on Us

BY

The WannaCry vulnerability that impacted more than 150 countries and took down computer systems in UK hospitals, stopped train service in Germany, and disrupted institutions in Asia and other areas, is a dramatic example of what could have been prevented by a patch that was originally released about 60 days ago. In fact, most breaches are … [Read more...]

10 Surprising Findings about Operationalizing Security

BY

The news headlines and social media comments about IT security vulnerabilities remain consistent – and they may cause you to take a closer look at what can be done to protect your organization. It seems like "another day, another data breach, another cyber attack, and another failed security audit." Fortunately, there are steps you can take to … [Read more...]

How SecOps Response Service Addresses WannaCry Ransomware

BY and

So, CVE-2017-0144 https://nvd.nist.gov/vuln/detail/CVE-2017-0144, a vulnerability that was identified about two months ago (published Mar 16 2017), is now being widely exploited in the wild, most visibly impacting hospitals in the UK’s National Health Service to the point that they’ve had to redirect incoming patients to other facilities. This … [Read more...]

Vulnerability Remediation – to the Cloud and Beyond!

BY

Understanding and managing risk Security teams often use a variety of vulnerability management and response tools to assess and address the vulnerability situation across the organization, frequently using different sets of tools for different environment types.   This often makes getting a single picture of the current risk profile difficult as … [Read more...]

How BMC Remedy Brings Value to SecOps

BY

Every company is a target for malicious actors who are seeking to gain access to valuable data, or to damage critical systems. With the average price of a data breach now standing at $4 million, security is everyone’s responsibility. ITSM has an important role to play, and can bring significant value to the Security Operations process. According to … [Read more...]

Vulnerability Management in 2017: Context is King

BY

A steady increase in the number of vulnerabilities each year has put a fresh focus on the discipline of vulnerability management. Although the Verizon 2016 Breach Investigations Report found that the top 10 vulnerabilities made up 85% of the successful exploit traffic, the remaining 15% were attributed to over 900 CVEs. This shows that we can … [Read more...]

Despite Increased Security Spending, Executives Remain Concerned About Their Organization’s Vulnerability

BY

In the midst of the digital revolution that is currently underway, bad guys are trying to take advantage and exploit individuals and business alike. No one is immune to cybercrime. In a recent study, out of 1,100 Chief Information Security Officers (CISOs) polled, 68% have experienced a breach, with 26% of those experiencing a breach during the … [Read more...]