A Win-Win for Missouri S&T

September 5th, 2013

Missouri University of Science & Technology faces a set of challenges many post-secondary organizations similarly face. On one side of the problem set, we have a whole fleet of student-owned endpoint devices—over 7,000—connecting to the network without any kind of centralized management because the university only has the means to manage campus-owned systems. On the [...]

By: - IT Security Expert, Author


Three Lessons Learned From the NSA’s Use of Big Data and Security Analytics

August 14th, 2013

Security analytics is the term being applied to the new methods being developed to counter sophisticated targeted attacks. The idea is simple but implementation requires skill sets that have yet to be acquired by most organizations. Gather as much data as possible, apply filters derived from security intelligence, and identify attacks in progress or already [...]

By: - Forensics and Security Expert


8 Bulletins, 3 Critical for August Patch Tuesday

August 8th, 2013

  IT departments will get a bit of a reprieve this August Patch Tuesday. While 8 bulletins may seem high at first glance, 3 of them are considered critical and just 1 – bulletin 1 – impacts the current code base. With 8 bulletins today, Microsoft’s year-to-date total is 65 patches. For anyone keeping track, [...]

By: - Technology Reporter


To Layer or Integrate? That is the Question

June 27th, 2013

Indeed, the debate over whether to mix a myriad of tools and technologies to create a bulletproof shield that hackers can’t invade or to take an integrated approach to in-depth defense to combat persistent threats is ongoing. But more cyber security analysts are speaking out about the benefits of integration. Also known as layered defense, [...]

By: - Information Security Reporter


Compliance Is Bad for Security

June 18th, 2013

There are two separate approaches to keeping data safe: compliance and security. The first is a legal/regulatory obligation; the second is not. If you ask a compliance author, whether that’s a government legislator or a bureaucratic regulator, what is the purpose of compliance, the reply will be ‘to ensure security.’ If you ask the same [...]

By: - Chairman and CEO, Lumension


3 Executive Strategies to Prioritize Your IT Risk

May 22nd, 2013

Every company wants to know the best way to protect their company, but it can be difficult when faced with the evolving security challenges of today. I recently sat down with Richard Mason, VP & CSO at Honeywell, Roger Grimes, security columnist and author, to get their thoughts on risk management best practices. I hope [...]

By: - Forensics and Security Expert


Push for Centralized Infrastructure and Branch Office Consolidation Will Prove Risky in 2013

December 17th, 2012

My series of 2013 predictions began with more malware and then some thoughts on risk created by quick data center consolidations. Furthering the idea of consolidation, I also think centralized infrastructure and branch office trends will create additional risk in the new year. Historically, our network infrastructures have been handled in a decentralized manner. Meaning, [...]

By: - Dir. Solutions Marketing

For Want of a Nail …

November 14th, 2012

… the kingdom was lost. This real-life cautionary tale, told to me by my colleague’s brother (let’s call him Mr. X), concerns a risk-reward decision gone awry. X’s company is a good-sized global in international construction services company with over $1B in revenue and around 5000 employees; they have about 7000 servers and endpoints under [...]

By: - SVP Global Marketing


Security Simplified at SecuritySCAPE 2012

September 27th, 2012

All good things must come to an end, and unfortunately the same goes for SecuritySCAPE 2012. To everyone who participated, thank you. I hope you enjoyed the event and walked away with new knowledge, ideas and tools to combat the constantly changing threat landscape. If you missed any of the sessions, you can view all [...]

By: - Chairman and CEO, Lumension


IT Security Can Be Simple; SecuritySCAPE Will Show You How

September 24th, 2012

When attempting to develop an endpoint security strategy, administrators often face a plethora of complicated questions: Do I still need AV? How can I ensure compliance? How do I secure machines for remote workers? Is there a way to secure multiple operating systems with one solution? With so many seemingly unrelated elements to consider, deploying [...]

By: - IT Security Expert, Author


Weaponized Malware’s Impact on the Enterprise

August 29th, 2012

Everything changed June 1, 2012. That’s when we entered the age of weaponized malware. On that day David Sanger’s article in the New York Times alerted the world to the fact that the United States and Israel were responsible for a long term, concerted campaign against the uranium refining capability of the Iranian regime. While [...]

By: - IT Security Expert, Author


3 Reasons Flame is a Game Changer

June 21st, 2012

Back in the late ’90s, the president of a prominent U.S. anti-virus company was approached by a delegation from India. Their request? Weapons-grade malware. In the same month, he was also approached by representatives from Pakistan with the same request. As he explains it: “Two nuclear armed nations with a common border and a history [...]

By: - Technology Reporter


London Olympics Ushers In IT Security Threats

June 19th, 2012

The London Olympics Games will shine a bright light on the United Kingdom this summer—in more ways than one. Along with the flood of people entering the city will come a flood of security threats for which CIOs and IT admins need to prepare. London organizers have warnedagainst increased cyber attacks and indeed, if the [...]

By: - Chairman and CEO, Lumension


A Look at April’s State of Cyber Security

May 1st, 2012


April was a busy month for those of us that follow cybersecurity happenings. Tune in to my take on the last 30 days and as always, please share your thoughts on these topics and/or include any other news I may have left out.  Download the podcast. Government Action Impacting our Industry CISPA: Yet Another Cybersecurity [...]

By: - Chairman and CEO, Lumension


The Road Ahead – Continuing to drive innovation in a budget conscious environment (Solution)

April 12th, 2011

This is Part III of the Innovation vs. Spending series. Also read Part I and Part II. We have entered 2011 as a cautiously optimistic nation.  However, the economic turmoil in the first quarter of this year leaves us uncertain.  The federal budget for fiscal year 2012 has yet to be finalized.  Unrest in Egypt [...]

IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us