By: - Forensics and Security Expert

@phenrycissp

Past, Present and Future of Endpoint Security

January 21st, 2014

In the throes of holiday shopping season, 110 million Target customers woke to the news that cleverly placed malware had pilfered their credit- and debit card numbers, along with other sensitive data. We aren’t yet certain who was behind the massive attack on Target and, evidently other large retailers, or how the heist was orchestrated. But [...]



By: - Chairman and CEO, Lumension

@pclawson

Keeping Pace with Evolving Risk

December 16th, 2013

video

Today we released the 5th annual State of the Endpoint study, together with our colleagues at independent research firm, the Ponemon Institute. We’ve all known for some time the bad guys keep getting better and IT pros are continually challenged to keep the pace. Reinforcing the idea that it isn’t if an organization will be [...]



By: - IT Security Expert

Employ a Targeted Defense Against Targeted Threats

November 11th, 2013

In my last post, I discussed the reality of APT hitting unsuspecting organizations with a predictable pattern. Study after study indicates people are being hit by malicious hackers and the attack goes on for months before anyone is any the wiser. If they ever know. Some very large companies, with hundreds of business units and [...]



By: - Technology Reporter

@jleclaire

No, Perimeter Protection is Not Dead

August 1st, 2013

Oracle is offering what it calls some “shocking conclusions” about cybersecurity, but will these conclusions cause any shift in emphasis away from the perimeter for the sake of protecting the database? According to a 110-company Oracle-sponsored survey from IDG Research’s CSO Customer Solutions Group, most IT security resources in today’s enterprise are allocated to protecting [...]



By: - Forensics and Security Expert

@phenrycissp

The Danger of Open Access to University IP

July 22nd, 2013

When I saw last week’s New York Times story about the problems universities are experiencing with cyber attacks, my first thought was one of surprise. Wasn’t this kind of story published years ago? Hackers are opportunistic and universities pride themselves on providing free and open access to materials. Cyber attacks on research universities have been [...]



By: - Forensics and Security Expert

@phenrycissp

Nothing Pretty About Fireworks Delivered From Microsoft This Patch Tuesday

July 9th, 2013

IT admins may have taken the Fourth off to enjoy some fireworks, but they’ll be very busy this week patching their systems. It’s not a pretty Patch Tuesday this month with 7 bulletins, 6 of which are critical. That brings our total of critical bulletins for the year to 22, which is fairly high, considering [...]



By: - Forensics and Security Expert

@phenrycissp

Securing the Internet of Things

June 6th, 2013

Gone are the days when the Internet was something accessed only through a PC attached to an Ethernet plug. Access is now available from anywhere and via a multitude of form factors. The Internet has moved beyond the computer and even your smartphone into the most unlikely of things. Your TV, your thermostat, even your [...]



By: - Chairman and CEO, Lumension

@pclawson

3 Executive Strategies to Prioritize Your IT Risk

May 22nd, 2013

Every company wants to know the best way to protect their company, but it can be difficult when faced with the evolving security challenges of today. I recently sat down with Richard Mason, VP & CSO at Honeywell, Roger Grimes, security columnist and author, to get their thoughts on risk management best practices. I hope [...]



By: - Forensics and Security Expert

@phenrycissp

No Luck o’ the Irish for IT this St. Patty’s Day

March 12th, 2013

video

IT admins can’t seem to catch a break this year. First, the never ending stream of Java issues that has kept folks on their toes since January. Now they’ve got another busy month of patches ahead of them, with 7 total patches from Microsoft, 4 of which are critical. However, once again the issues outside of Microsoft [...]



By: - SVP Global Marketing

@cedwardbrice

Why the Bit9 Hack is Not a Failure of Application Control, Whitelisting

February 19th, 2013

There’s never a dull day in the security industry. Anymore, we rarely have to look beyond the proverbial front page for news on the latest hack. Cyber attacks are increasing in volume and sophistication and no one is immune. Two weeks ago, my preferred grocery store here in Phoenix announced they had been breached. And [...]


By: - Information Security Consultant

@kevinbeaver

Reactive Security, How’s That Working For You?

February 6th, 2013

Experience is something you don’t get until just after you need it. That’s an old saying but it’s still relevant, especially as it relates to IT and information security. So why is it we keep finding ourselves behind the eight ball when it comes to security and especially with today’s advanced malware? There are many [...]


By: - Information Security Consultant

@kevinbeaver

Dealing with Today’s Information Systems Complexity

January 14th, 2013

Information systems complexity is the enemy of security. From mobile to the cloud and practically everything in between, all businesses have information systems complexities which are creating big security issues. This complexity rears its ugly head time and again in businesses both small and large and, given our dependence on information, appears to be on [...]


By: - Chairman and CEO, Lumension

@pclawson

Disheartening Disconnect Identified by 2013 State of Endpoint Risk Study

December 4th, 2012

I’m concerned about the results of our fourth annual State of the Endpoint study just completed by the Ponemon Institute. Over the years, IT pros have reported shrinking confidence in the security of their networks. While this year is no different, the number of IT security pros who responded no, they are not more confident [...]


By: - SVP Global Marketing

@cedwardbrice

Security Simplified at SecuritySCAPE 2012

September 27th, 2012

All good things must come to an end, and unfortunately the same goes for SecuritySCAPE 2012. To everyone who participated, thank you. I hope you enjoyed the event and walked away with new knowledge, ideas and tools to combat the constantly changing threat landscape. If you missed any of the sessions, you can view all [...]


By: - Chairman and CEO, Lumension

@pclawson

IT Security Can Be Simple; SecuritySCAPE Will Show You How

September 24th, 2012

When attempting to develop an endpoint security strategy, administrators often face a plethora of complicated questions: Do I still need AV? How can I ensure compliance? How do I secure machines for remote workers? Is there a way to secure multiple operating systems with one solution? With so many seemingly unrelated elements to consider, deploying [...]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com