SecOps Blog – BMC Blogs http://www.bmc.com/blogs BMC Software Wed, 18 Oct 2017 18:04:44 +0000 en-US hourly 1 http://blogs.bmc.com/wp-content/uploads/2016/04/bmc_favicon-300x300-150x150.png SecOps Blog – BMC Blogs http://www.bmc.com/blogs 32 32 5 Ways Multi-Cloud Discovery Can Enhance IT Security http://www.bmc.com/blogs/5-ways-data-center-discovery-can-enhance-security/ Tue, 17 Oct 2017 01:01:23 +0000 http://www.bmc.com/blogs/?p=10118 2017 is almost over and as expected, has achieved new records in technology adoption, driven by the transformation of traditional businesses into digital enterprises. While several huge security breaches have been in the news this year, the threat level continues to grow, with cybercrime getting more organized, and derailing the power of new technology. If […]]]> Learning from the Equifax Breach http://www.bmc.com/blogs/learning-from-the-equifax-breach/ Wed, 04 Oct 2017 08:30:18 +0000 http://www.bmc.com/blogs/?p=11277 As organizations continue to adopt open source software and cloud technologies, maintaining a secure and compliant environment is getting more challenging. As noted in the WSJ post Out-of-Date Software Creates Incalculable Cyber Risk, even though Equifax was aware of the Apache Struts vulnerability (CVE 2017-5638) and attempted to fix it, there were still critical systems […]]]> Struggling with Security Vulnerabilities? Take the Demo and Find Out How to Close Them Quickly. http://www.bmc.com/blogs/struggling-with-security-vulnerabilities-take-the-demo-and-find-out-how-to-close-them-quickly/ Wed, 27 Sep 2017 10:30:36 +0000 http://www.bmc.com/blogs/?p=11262 You’ve probably noticed that cyber-attacks are making headline news more frequently than ever before and they can wreak havoc on a company’s bottom line. In fact, they’re so prevalent that cybercrime damage costs are expected to hit $6 trillion by 2021, which is double the cost from a year ago.1 Most of the time, hackers […]]]> 9 Pressing IT Security Challenges – and How to Mitigate Them http://www.bmc.com/blogs/9-pressing-it-security-challenges-and-how-to-mitigate-them/ Wed, 20 Sep 2017 08:00:13 +0000 http://www.bmc.com/blogs/?p=11224 The list of threats that keep IT security professionals up at night can seem almost endless – and it gets longer every day. With the transformation and digitization of business, IT security has never been more important or under more pressure from both internal and external sources. These challenges include: The number and intensity of […]]]> SecOps Response Service Earns Industry Accolades http://www.bmc.com/blogs/secops-response-service-earns-industry-accolades/ Wed, 23 Aug 2017 09:00:23 +0000 http://www.bmc.com/blogs/?p=11079 As today’s high-risk digital environment drives the need for faster, more effective, and more efficient vulnerability remediation, SecOps Response Service from BMC has earned two recent industry awards validating its success in addressing this critical need. While media headlines tend to focus on newly emerging threats, IT leaders know that most successful attacks target known […]]]> Top 5 Cyber Practices To Keep You Safe http://www.bmc.com/blogs/top-5-cyber-practices-to-keep-you-safe/ Tue, 22 Aug 2017 09:50:28 +0000 http://www.bmc.com/blogs/?p=11099 People assume that staying safe from cyber hackers requires a lot of money. While spending money in the right area is important, common sense features costing little to no money and are the most effective defenses to thwart a cyber attack. Let’s face it, no one is 100% safe from cyber hackers so each of […]]]> IT Compliance vs IT Security: What’s the Difference? http://www.bmc.com/blogs/it-security-vs-it-compliance-whats-the-difference/ Tue, 22 Aug 2017 08:00:26 +0000 http://www.bmc.com/blogs/?p=11030 For some IT professionals, the line between security and compliance becomes easily blurred and may seem like a moving target. How do we create comprehensive security programs while meeting compliance obligations? Is checking the compliance box really enough? And how does all this enable the business to function and move forward? These are questions that […]]]> Top 21 IT Security Conferences, InfoSec and Cyber Security Events of 2017 http://www.bmc.com/blogs/it-infosec-cyber-security-conferences/ Mon, 14 Aug 2017 02:50:56 +0000 http://www.bmc.com/blogs/?p=11011 Be sure to check out our other posts on Tech/IT Conferences and DevOps Conferences. Whether you are a security pro, software developer, security administrator, or any other role in the IT security fields, attending a conference is an excellent way to network with other professionals and extend your knowledge base. These IT security and cybersecurity […]]]> Hacking the Internet of Things – It’s as Simple as ABC http://www.bmc.com/blogs/hacking-the-internet-of-things-its-as-simple-as-abc/ Tue, 25 Jul 2017 13:40:59 +0000 http://www.bmc.com/blogs/?p=10916 Gartner estimates that 8.4 billion connected things will be in use worldwide this year, up 31% from 2016, and will reach 20.4 billion by 2020. The Internet of Things is replete with cars, electronic appliances, heating and lighting systems, medical devices, pipelines, power meters, printers, sensors, routers, security systems, smart cities, smart TV’s, SCADA systems, […]]]> The Future of Ransomware http://www.bmc.com/blogs/the-future-of-ransomware/ Thu, 20 Jul 2017 00:15:05 +0000 http://www.bmc.com/blogs/?p=10892 A few years ago, if the average person heard the term ‘ransomware’ they might have imagined the fashion ensemble of a kidnapper. Fast forward to today and most everyone one is now familiar with ransomware one way or another. Most ransomware infects target computers when unsuspecting users click on an attachment or link usually embedded […]]]>