SecOps Blog – BMC Blogs BMC Software Tue, 12 Dec 2017 17:05:27 +0000 en-US hourly 1 SecOps Blog – BMC Blogs 32 32 Data Breach Conundrum – Who’s on First? Tue, 12 Dec 2017 00:00:55 +0000 The first recorded data breach of our century occurred in 1984 at TRW, a credit reporting agency. One stolen password posted to an electronic bulletin board could have permitted access to the credit histories of 90 million people. Computer experts warned that prevention of such incidents demanded greater security. Thirty-three years later—the data breach conundrum […]]]> Hackers Have Gone Into Uber Drive: How You Can Protect Yourself Mon, 04 Dec 2017 11:50:20 +0000 At the risk of sounding like a geek, I could not help but notice the discussion about whether the 2016 Uber hack was ransomware or just extortion. I searched the web and the consensus definition of ransomware is “a type of malware that encrypts files so they cannot be opened, and prevents you from using […]]]> 4 Ways to Reduce the Pain of Multi-Cloud Compliance – Take the Trial and Learn How Tue, 28 Nov 2017 13:12:58 +0000 Staying ahead of the competition in digital business means that companies must continually innovate and deliver improved services and products to the market. The speed and agility of public cloud has proven to be a cost effective, flexible platform, but it has brought with it new security challenges. The cloud has matured and can be […]]]> Breach Recovery Checklist For You And Your Company Tue, 28 Nov 2017 12:49:58 +0000 No business or individual is immune to a cyber breach, yet I hear many people say they don’t think they will be affected. They believe that their company does not have anything valuable enough to be stolen, but every company and individual has data that is valuable to a cyberthief that they might overlook. While […]]]> 4 Key Findings from Forrester Survey on SecOps Maturity Tue, 21 Nov 2017 08:47:12 +0000 Maturity is typically used in the context of a person’s path to adulthood. Do they behave and act as civilized adults according to social norms? Or do they throw tantrums, speak out of turn or lack the decorum to behave appropriately for the situation? We also use maturity to describe the sophistication and completeness of […]]]> BMC SecOps Policy Service Scales Security and Regulatory Compliance for Complex Cloud Environments Fri, 17 Nov 2017 00:00:37 +0000 As cloud application development teams release software under mounting pressure to improve speed, differentiation, and agility, ensuring security and regulatory compliance can become an after-thought. Moreover, maintaining said compliance across complex cloud environments using a broad array of services from the likes of AWS can present very real, very high-stakes challenges. BMC can help. BMC […]]]> HIPAA’s Security Rule: The Beginner’s Guide Mon, 06 Nov 2017 09:01:42 +0000 Before HIPAA, there were no general requirements or security standards for protecting patient health information in the healthcare industry. Without regulations set in place, healthcare providers could not confidently state that their patients’ sensitive data was properly protected. Once the Health Insurance Portability and Accountability Act was passed by the federal government, businesses now had […]]]> HIPAA Introduction and Compliance Checklist Thu, 26 Oct 2017 10:32:54 +0000 In a world where healthcare records are increasingly found electronically and on the cloud, protecting this sensitive and confidential information has never been more vital. If you work in healthcare, you know how often you find yourself with access to sensitive personal information, all of which needs to be properly stored, transmitted, and protected. Patients […]]]> 5 Ways Multi-Cloud Discovery Can Enhance IT Security Tue, 17 Oct 2017 01:01:23 +0000 2017 is almost over and as expected, has achieved new records in technology adoption, driven by the transformation of traditional businesses into digital enterprises. While several huge security breaches have been in the news this year, the threat level continues to grow, with cybercrime getting more organized, and derailing the power of new technology. If […]]]> Learning from the Equifax Breach Wed, 04 Oct 2017 08:30:18 +0000 As organizations continue to adopt open source software and cloud technologies, maintaining a secure and compliant environment is getting more challenging. As noted in the WSJ post Out-of-Date Software Creates Incalculable Cyber Risk, even though Equifax was aware of the Apache Struts vulnerability (CVE 2017-5638) and attempted to fix it, there were still critical systems […]]]>