SecOps Blog – BMC Blogs BMC Software Thu, 22 Feb 2018 00:53:15 +0000 en-US hourly 1 SecOps Blog – BMC Blogs 32 32 Prevent Cryptojacking by Securing Kubernetes Wed, 21 Feb 2018 23:23:31 +0000 A disturbing new trend is on the rise in public cloud security breaches. Attackers are not just stealing sensitive data, but now they’re also hijacking compute power in insecurely configured Kubernetes clusters to mine for cryptocurrency. Tesla, Aviva, and other companies had their Kubernetes clusters on AWS used for cryptocurrency mining, in addition to potential […]]]> Top IT Security, Information Security, and CyberSecurity Conferences of 2018 Fri, 12 Jan 2018 13:50:56 +0000 Whether you are a security pro, software developer, security administrator, or any other role in the IT security fields, attending a conference is an excellent way to network with other professionals and extend your knowledge base. These IT security and cybersecurity conferences provide exclusive access to some of the newest innovations and ideas from all […]]]> Spectre and Meltdown Vulnerabilities: Avoid the War Room Wed, 10 Jan 2018 00:00:57 +0000 Researchers have discovered a new way that hackers can potentially exploit systems to expose passwords, keys, and other sensitive data – and this time it involves the physical hardware. (Source: NYTimes) These new vulnerabilities, called Spectre and Meltdown, were discovered in Intel processors, and more specifically the way that the processors anticipate requests and cache […]]]> Resolutions to Improve Security in 2018 (Part 1) Wed, 03 Jan 2018 00:00:56 +0000 I first read Dr. Covey’s 7 Habits of Highly Effective People over 25 years ago and, despite the technological revolutions in that period, it is as relevant today as it was when the earth cooled. As we look to the new year for opportunities to improve our IT operations and security, let’s remember to begin […]]]> What is Threat Remediation? Threat Remediation explained Wed, 20 Dec 2017 00:00:55 +0000 With the recent onset of ransomware plaguing the Internet, threat remediation has become an important piece of the cybersecurity puzzle for businesses who wish to protect their digital assets. But what exactly does threat remediation mean? What are the most effective methods for successful threat remediation? And how can organizations know if they have adopted […]]]> Data Breach Conundrum – Who’s on First? Tue, 12 Dec 2017 00:00:55 +0000 The first recorded data breach of our century occurred in 1984 at TRW, a credit reporting agency. One stolen password posted to an electronic bulletin board could have permitted access to the credit histories of 90 million people. Computer experts warned that prevention of such incidents demanded greater security. Thirty-three years later—the data breach conundrum […]]]> Hackers Have Gone Into Uber Drive: How You Can Protect Yourself Mon, 04 Dec 2017 11:50:20 +0000 At the risk of sounding like a geek, I could not help but notice the discussion about whether the 2016 Uber hack was ransomware or just extortion. I searched the web and the consensus definition of ransomware is “a type of malware that encrypts files so they cannot be opened, and prevents you from using […]]]> 4 Ways to Reduce the Pain of Multi-Cloud Compliance – Take the Trial and Learn How Tue, 28 Nov 2017 13:12:58 +0000 Staying ahead of the competition in digital business means that companies must continually innovate and deliver improved services and products to the market. The speed and agility of public cloud has proven to be a cost effective, flexible platform, but it has brought with it new security challenges. The cloud has matured and can be […]]]> Breach Recovery Checklist For You And Your Company Tue, 28 Nov 2017 12:49:58 +0000 No business or individual is immune to a cyber breach, yet I hear many people say they don’t think they will be affected. They believe that their company does not have anything valuable enough to be stolen, but every company and individual has data that is valuable to a cyberthief that they might overlook. While […]]]> 4 Key Findings from Forrester Survey on SecOps Maturity Tue, 21 Nov 2017 08:47:12 +0000 Maturity is typically used in the context of a person’s path to adulthood. Do they behave and act as civilized adults according to social norms? Or do they throw tantrums, speak out of turn or lack the decorum to behave appropriately for the situation? We also use maturity to describe the sophistication and completeness of […]]]>