Security & Compliance Blog – BMC Blogs BMC Software Fri, 15 Feb 2019 13:06:36 +0000 en-US hourly 1 Security & Compliance Blog – BMC Blogs 32 32 Top 17 IT Security, InfoSec, & CyberSecurity Conferences for 2019 Fri, 11 Jan 2019 00:00:56 +0000 Whether you are a security pro, software developer, security administrator, or any other role in the IT security fields, attending a conference is an excellent way to network with other professionals and extend your knowledge base. These IT security and cybersecurity conferences provide exclusive access to some of the newest innovations and ideas from all […]]]> Trick or Treat: Keep the Hackers Outside Your Door This Halloween Tue, 16 Oct 2018 00:00:47 +0000 It’s Halloween again, time for ghosts, goblins, witches, and the TV show “It’s the Great Pumpkin Charlie Brown”. Most trick or treaters are harmless, and in fact it’s kind of fun to dress up and go trick or treating. I’ll be strapping on my Lederhosen this year and will go out as an attendee at […]]]> 3 Best Practices for Automating Validation of Data Thu, 04 Oct 2018 00:00:03 +0000 When it comes to automating data validation, companies already know the pros and cons. Before cloud computing ushered in the 21st-century world of big data, data entry was manual and time-consuming, with three major issues: data sets were often too small to be reliable or impactful, human error could easily introduce bad data, and the […]]]> PCI Guidelines for Cloud Computing and Containers Wed, 26 Sep 2018 00:00:09 +0000 Those who operate in the enterprise tech space have a responsibility to ensure that new advances in technology comply with overarching standards and regulations like ISO, GDPR, HIPAA, and, of course, PCI. Indeed, any company that collects, holds or processes personal credit card information must adhere to PCI Payment Card Industry Data Security Standards, or […]]]> Gartner Magic Quadrant for SIEM Wed, 19 Sep 2018 00:00:33 +0000 In order to provide the latest updates surrounding the security information and event management- SIEM- market, leading research group Gartner releases a yearly report with the top vendors for organizations to consider: Gartner Magic Quadrant for Security Information and Event Management (SIEM). Defined by the customer’s need to analyze event data in real-time for the […]]]> What are Security Operations Centers (SOC)? Tue, 28 Aug 2018 00:00:26 +0000 If you work in the technology field, you’ve probably heard of SOCs. And if you don’t – well, it seems to be another acronym to throw in with the rest. Here’s the thing, though: SOCs, short for security operations centers, are a vital component to most enterprises, whether a legacy company with a well-established footing […]]]> What is an “Advanced Persistent Threat”? APTs Explained Mon, 27 Aug 2018 00:00:52 +0000 We live in an increasingly digital world and keeping organizations secure in this environment has become more demanding than ever before. Persistent threats have hidden and continuous computer hacking processes that target a specific entity. These threats are covert, focus on accomplishing a specific task and can happen continuously over time. They are considered persistent […]]]> BMC Cloud Operations Uses TrueSight Cloud Security Tue, 14 Aug 2018 00:00:08 +0000 Yes, we eat our own cooking. Have you ever wondered how BMC Software keeps its cloud environments safe and secure? One of the proudest and most thrilling moments for our Cloud Engineering team was using our TrueSight Cloud Security, BMC’s very own automated cloud security and compliance solution, to achieve 100% compliance of our multiple […]]]> Intrusion Detection vs Intrusion Prevention Systems: What’s the Difference? Thu, 26 Jul 2018 00:00:24 +0000 Network Intrusion refers to unauthorized activity within an IT infrastructure network. The purpose of unauthorized network activities range from espionage and exploitation to data leaks and network downtime. According to the 2018 Verizon Data Breach Investigations Report that studied more than 53,000 security incidents around the world, most network infringements attempts successfully compromise the network […]]]> What is Ransomware as a Service? RaaS Explained Thu, 19 Jul 2018 00:00:19 +0000 Software is shifting away from locally-installed apps to Software as a Service web applications that run in the cloud. Criminals are cashing in on this trend, which has led to the creation of Ransomware as a Service (RaaS), a growing threat to business. RaaS refers to various online malware exploits that bad actors can use […]]]>