Digital transformation for business is no longer a luxury. All companies must accelerate the development and continuous deployment of innovative processes, applications, services, and software changes just to survive. To meet this challenge, companies are increasingly turning to the cloud for the agility, scale and operating flexibility that is … [Read more...]
SecOps IT Security & Compliance Blog
Delivering effective IT security and compliance means enabling Security and Operations teams to work effectively together. This is how IT can deliver what the business needs: secure and reliable IT services.
Learn about IT Security and Compliance in BMC's complete guide.
Every company is a target for malicious actors who are seeking to gain access to valuable data, or to damage critical systems. With the average price of a data breach now standing at $4 million, security is everyone’s responsibility. ITSM has an important role to play, and can bring significant value to the Security Operations process. According to … [Read more...]
A steady increase in the number of vulnerabilities each year has put a fresh focus on the discipline of vulnerability management. Although the Verizon 2016 Breach Investigations Report found that the top 10 vulnerabilities made up 85% of the successful exploit traffic, the remaining 15% were attributed to over 900 CVEs. This shows that we can … [Read more...]
In the midst of the digital revolution that is currently underway, bad guys are trying to take advantage and exploit individuals and business alike. No one is immune to cybercrime. In a recent study, out of 1,100 Chief Information Security Officers (CISOs) polled, 68% have experienced a breach, with 26% of those experiencing a breach during the … [Read more...]
Remote shell attacks against password-less systems date back to before the modern Internet era, and allowing root (administrative) users to connect directly using SSH (PermitRootLogon) still catches my attention. We went through similar security challenges with MySQL, which in some default configurations also didn’t require a password for local … [Read more...]
2017 just kicked-off and is expected by many to achieve new records in technology adoption, driven by the transformation of traditional businesses into digital enterprises. While this presents huge opportunities, the threat level has never been so high with cybercrime getting more organized, and derailing the power of new technology. I wanted to … [Read more...]
In the Art of War, legendary strategist Sun Tzu speaks of the necessity of understanding your enemy – not just at a superficial level, but also to know how they think. If you had the chance to pick the brain of a hacker to learn more about how hackers work and what you can do about it, here’s what you would find. This individual – let’s call him … [Read more...]
2016 was a year of surprises. The continued growth of hacking incidents with their devastating trail of destruction was among the more shocking developments. It brought cybersecurity concerns to the center of every conversation. Many an IT executive has suffered sleepless nights as they tried to figure out how they could protect their … [Read more...]
If your IT organization is like most enterprises, you’ve seen how the demands of digital business put greater pressure on the service desk to become more efficient and responsive, while continuing to drive down costs. Plus, you have to do all of this at a time when hacking is on the rise and threatens the business. While self-service and … [Read more...]
If you’re like most people, you probably lock the doors of your home or apartment when you’re not there. It’s easy to do, is a cultural norm, and reduces the chance of having a criminal break in. It’s a standard practice that leaves you less vulnerable to intruders. Now, take that same thought and apply it to protecting the enterprise. As digital … [Read more...]