IT environments are changing all the time Business today drives frequent application changes, which typically means infrastructure changes, such as new configurations, new servers, new application servers, new open source or commercial libraries, network route and port changes, and so on. Understanding the impact of these high-velocity, broad … [Read more...]
SecOps IT Security & Compliance Blog
Delivering effective IT security and compliance means enabling Security and Operations teams to work effectively together. This is how IT can deliver what the business needs: secure and reliable IT services.
Learn about IT Security and Compliance in BMC's complete guide.
Another day another headline about a security breach. Organizations both public and private are under attack by an enemy who is well resourced, highly motivated, and hidden from view. In today’s digital world where everything has to be accessible, how can organizations mitigate the risks that hackers, vulnerabilities, unidentified systems and … [Read more...]
In 2015, headlines were riddled with reports of large scale cyberattacks stealing everything from government secrets to children’s birthdays. IT Executives cringed as they wondered what the chances were that they would be next. In 2016 the horror show continues as hospital systems are held hostage by ransomware, and every day more vulnerabilities … [Read more...]
In the business world, you don’t have to worry about zombies wandering the halls of accounting or hiding in the closets of the legal department. But there’s a good chance you’ll find at least a few of them in IT. I’m not referring to the reanimated dead depicted in popular TV series such as The Walking Dead. I’m talking about zombie servers lurking … [Read more...]
In 2015, headlines were riddled with reports of large scale hacking attacks stealing everything from government secrets to children’s birthdays and toy profiles. IT Executives cringed as they wondered what the chances were that they would be next. In 2016, as leaders, we need to resolve to take control of the issues so we can protect our … [Read more...]
Security threats are becoming a more serious and frequent problem than ever before, costing companies millions of dollars per breach event. The good news is that many of these could be avoided, as hackers frequently take advantage of known vulnerabilities. The bad news is that many organizations are unprepared because IT Operations and Security … [Read more...]
Industry leaders worldwide are rapidly taking advantage of digital advances in analytics, mobility, social media, and smart embedded devices to keep up with new demands from both internal and external customers. This has created a situation where it is more important than ever to take practical steps for strengthening IT security. This … [Read more...]
A good presentation should give the audience some food for thought. I've sat through my share of presentations, and I try to learn from those experiences to make sure that I deliver value to my audience during my own talks. Delivering a remote presentation constitutes a whole other level of difficulty, of course, and so I'm always looking for … [Read more...]
IDC Technology Spotlight “Mature Cloud Management Depends on Effective Governance and Automation”Free Download I apologize—I know it’s not a funny, wry, or ironic title. Articles about cloud are often followed up with some hyperbole about how cloud computing will help solve world peace. But I’m confident you, our readers, have moved on from the … [Read more...]
…or at least, it should be A recent PCI compliance report from Verizon contains some interesting findings. It starts off with what seems like good news: compliance rates between audits are increasing, with an 80% increase in the number of companies being validated as PCI-DSS compliant at their interim assessments. However, 80% of companies … [Read more...]