Five Ways to Future-Proof Information Security Processes
From DDoS to IP theft, cyber attacks are taking their toll on organizations. Realizing the potential impact to the bottom line, the business is increasingly ready to participate in managing cyber risks. According to the Global State of Information Security® Survey 2014, leading organizations are “enhancing security capabilities in ways that show security is now a business imperative—not just an IT challenge.” The survey reveals average losses from incidents are up 18% over last year, with big liabilities increasing faster than smaller losses. More proactive cyber risk management is required in order for organizations to innovate and prosper.
The post Five Ways to Future-Proof Information Security Processes appeared first on Speaking of Security - The RSA Blog and Podcast.
5 Ways Identity Intelligence Can Improve Your Security in 2014
Like maxed-out credit cards and New Year’s Eves failing to live up to expectations, countdowns and recaps are reality of December. The finality of year’s end lends itself well to contextualization, and easily assembled compilations make for effortless content in a time known for its atrophic work ethic and egg nog-induced malaise. It’s a powerful...
The post 5 Ways Identity Intelligence Can Improve Your Security in 2014 appeared first on Speaking of Security - The RSA Blog and Podcast.
Secure Server: Ephemeral DH vs. ECDH
The more TLS handshakes per second that can be processed on a secure web server the greater its capacity. Alternatively, the more handshakes processed per second by each web server, the fewer servers that are required to handle the load. Fewer servers means lower costs. But this saving should not come at the cost of security.
Balancing Security and Privacy: Embracing an Advanced Cyber Defense Strategy
In his recent keynote at RSA Conference Europe 2013, Art Coviello, RSA Executive Chairman, painted a sobering picture of the challenges confronting cybersecurity professionals. We face a continued increase in the sophistication and rate of cyberattacks. Attack surfaces are expanding, due to the explosion of apps, digital content, mobile devices and virtualized infrastructure. And legacy...
Vulnerability Risk Management: Metrics that Matter
In my previous blogs (Vulnerability Risk Management: Let’s not boil the Ocean and Vulnerability Risk Management - It is a Big Deal) in this series, I focused on how important Vulnerability Risk Management is for organizations and the need to take it beyond a compliance task. When you take that next step to use vulnerability identification and remediation as a core piece of your threat prevention strategy, key metrics must be put in place to measure the success.
The post Vulnerability Risk Management: Metrics that Matter appeared first on Speaking of Security - The RSA Blog and Podcast.