Security & Compliance Blog – BMC Blogs https://www.bmc.com/blogs BMC Software Mon, 19 Nov 2018 12:06:54 +0000 en-US hourly 1 https://blogs.bmc.com/wp-content/uploads/2016/04/bmc_favicon-300x300-150x150.png Security & Compliance Blog – BMC Blogs https://www.bmc.com/blogs 32 32 Trick or Treat: Keep the Hackers Outside Your Door This Halloween https://www.bmc.com/blogs/trick-or-treat-keep-the-hackers-outside-your-door-this-halloween/ Tue, 16 Oct 2018 00:00:47 +0000 https://www.bmc.com/blogs/?p=12955 It’s Halloween again, time for ghosts, goblins, witches, and the TV show “It’s the Great Pumpkin Charlie Brown”. Most trick or treaters are harmless, and in fact it’s kind of fun to dress up and go trick or treating. I’ll be strapping on my Lederhosen this year and will go out as an attendee at […]]]> 3 Best Practices for Automating Validation of Data https://www.bmc.com/blogs/automate-data-validation/ Thu, 04 Oct 2018 00:00:03 +0000 https://www.bmc.com/blogs/?p=12930 When it comes to automating data validation, companies already know the pros and cons. Before cloud computing ushered in the 21st-century world of big data, data entry was manual and time-consuming, with three major issues: data sets were often too small to be reliable or impactful, human error could easily introduce bad data, and the […]]]> PCI Guidelines for Cloud Computing and Containers https://www.bmc.com/blogs/pci-guidelines-cloud-containers/ Wed, 26 Sep 2018 00:00:09 +0000 https://www.bmc.com/blogs/?p=12870 Those who operate in the enterprise tech space have a responsibility to ensure that new advances in technology comply with overarching standards and regulations like ISO, GDPR, HIPAA, and, of course, PCI. Indeed, any company that collects, holds or processes personal credit card information must adhere to PCI Payment Card Industry Data Security Standards, or […]]]> Gartner Magic Quadrant for SIEM https://www.bmc.com/blogs/gartner-magic-quadrant-siem/ Wed, 19 Sep 2018 00:00:33 +0000 https://www.bmc.com/blogs/?p=12801 In order to provide the latest updates surrounding the security information and event management- SIEM- market, leading research group Gartner releases a yearly report with the top vendors for organizations to consider: Gartner Magic Quadrant for Security Information and Event Management (SIEM). Defined by the customer’s need to analyze event data in real-time for the […]]]> What are Security Operations Centers (SOC)? https://www.bmc.com/blogs/security-operations-centers/ Tue, 28 Aug 2018 00:00:26 +0000 https://www.bmc.com/blogs/?p=12759 If you work in the technology field, you’ve probably heard of SOCs. And if you don’t – well, it seems to be another acronym to throw in with the rest. Here’s the thing, though: SOCs, short for security operations centers, are a vital component to most enterprises, whether a legacy company with a well-established footing […]]]> What is an “Advanced Persistent Threat”? APTs Explained https://www.bmc.com/blogs/advanced-persistent-threats/ Mon, 27 Aug 2018 00:00:52 +0000 https://www.bmc.com/blogs/?p=12719 We live in an increasingly digital world and keeping organizations secure in this environment has become more demanding than ever before. Persistent threats have hidden and continuous computer hacking processes that target a specific entity. These threats are covert, focus on accomplishing a specific task and can happen continuously over time. They are considered persistent […]]]> BMC Cloud Operations Uses TrueSight Cloud Security https://www.bmc.com/blogs/bmc-cloud-operations-uses-truesight-cloud-security/ Tue, 14 Aug 2018 00:00:08 +0000 https://www.bmc.com/blogs/?p=12641 Yes, we eat our own cooking. Have you ever wondered how BMC Software keeps its cloud environments safe and secure? One of the proudest and most thrilling moments for our Cloud Engineering team was using our TrueSight Cloud Security, BMC’s very own automated cloud security and compliance solution, to achieve 100% compliance of our multiple […]]]> Intrusion Detection vs Intrusion Prevention Systems: What’s the Difference? https://www.bmc.com/blogs/ids-intrusion-detection-vs-ips-intrusion-prevention-systems/ Thu, 26 Jul 2018 00:00:24 +0000 http://www.bmc.com:80/blogs/?p=12549 Network Intrusion refers to unauthorized activity within an IT infrastructure network. The purpose of unauthorized network activities range from espionage and exploitation to data leaks and network downtime. According to the 2018 Verizon Data Breach Investigations Report that studied more than 53,000 security incidents around the world, most network infringements attempts successfully compromise the network […]]]> What is Ransomware as a Service? RaaS Explained https://www.bmc.com/blogs/ransomware-as-a-service/ Thu, 19 Jul 2018 00:00:19 +0000 http://www.bmc.com:80/blogs/?p=12572 Software is shifting away from locally-installed apps to Software as a Service web applications that run in the cloud. Criminals are cashing in on this trend, which has led to the creation of Ransomware as a Service (RaaS), a growing threat to business. RaaS refers to various online malware exploits that bad actors can use […]]]> What is Identity-As-A-Service? IDaaS Explained https://www.bmc.com/blogs/identity-as-a-service-idaas/ Mon, 16 Jul 2018 00:00:04 +0000 http://www.bmc.com:80/blogs/?p=12582 Cloud computing brings unprecedented new requirements to manage user identity and access privileges. The average number of cloud-based apps used in enterprises ranges between 900 to 1200 different services. If each service requires its own set of login credentials, users will inherently rely on vulnerable password combinations or avoid using the service entirely. In order […]]]>