Our Digital Universe – The 5th Dimension
Last week, EMC released its 7th study of the Digital Universe. For those of us that spend our days investigating, building, securing and living in the digital world, the report is a captivating exploration of the only part of our universe that we – meaning Man – are responsible for and control. The concept is absolutely fascinating. We mere mortals have created a universe that, just like our physical universe, is expanding, growing and deepening on a scale of sheer incomprehensible magnitude.
Identify Risk in a Heartbeat
By now, you most likely have heard of the announcement of the Heartbleed vulnerability in versions of OpenSSL. Actually, by this time, your executives, your front line managers and your mother-in-law have probably heard of the Heartbleed vulnerability given it has hit every major new source (WSJ, CNET, CNN) While this ubiquitous software is a foundation for many web applications, most people will relegate this as “someone else’s problem”. However, many companies utilize OpenSSL within their own infrastructures to secure internal applications. Even if you aren’t affected by this specific vulnerability, the noise created by Heartbleed should again prompt you to think about your own vulnerability management program.
What You need to Know About Heartbleed
The world has been talking about a new security buzzword and that buzzword is “HeartBleed”. What is Heartbleed? Heartbleed is the nickname given to the vulnerability known as CVE-2014-0160, which is a flaw in the TLS/DTLS heartbeat extension implementation in certain versions of OpenSSL. In plain English, this vulnerability allows an attacker to use a...
RSA SecurWorld 5-STAR Partner Program Winner
For the fifth consecutive year in a row, I am happy to announce that the RSA SecurWorld Partner Program has been named a 5-STAR Program by CRN.
Stop the Bad Guys With Proactive Defense
You may be familiar with the colloquialism "shutting the barn door after the horses escape." It basically refers to the futility of trying to stop something from happening after it has already happened—a concept that defines the traditional approach to network and computer security. Deterrence is about taking a proactive approach that prevents the event from happening in the first place.