By: - Dir. Solutions Marketing

SC Magazine 2014 Malware Defenses Survey Results (part 3)

August 19th, 2014

The report on the 2014 Malware Defenses survey conducted by SC Magazine is now out. Overall, it shows that organizations are starting to wake up to the risk of targeted (or APT) attacks – but they still have a ways to go on many fronts. In this last of three posts, we will close by […]



By: - Dir. Solutions Marketing

SC Magazine 2014 Malware Defenses Survey Results (part 2)

August 14th, 2014

The report on the 2014 Malware Defenses survey conducted by SC Magazine is now out. Overall, it shows that organizations are starting to wake up to the risk of targeted (or APT) attacks – but they still have a ways to go on many fronts. In this second of three posts, we will examine how […]



By: - Dir. Solutions Marketing

SC Magazine 2014 Malware Defenses Survey Results

August 11th, 2014

The report on the 2014 Malware Defenses survey conducted by SC Magazine is now out. Overall, it shows that organizations are starting to wake up to the risk of targeted (or APT) attacks – but they still have a ways to go on many fronts. In this first of three posts, we will delve into […]



By: - Dir. Solutions Marketing

Information Aversion – The Ostrich Effect

July 30th, 2014

Are we hurting our cause when we describe, in gruesome detail, the potential outcomes of a data breach or other IT security breach? Are we inadvertently pushing real security further off when we chase on the latest whiz bang technology instead of focusing on making steady progress? That’s what came to mind when I recently […]



By: - Former SVP Global Marketing

@cedwardbrice

2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors

July 29th, 2014

Originally published on ITBusinessEdge. » Read the full article In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like: what are the coming situational issues surrounding the security of our data? How are we as an organization really doing in securing our valuable […]



A Win-Win for Missouri S&T

September 5th, 2013

Missouri University of Science & Technology faces a set of challenges many post-secondary organizations similarly face. On one side of the problem set, we have a whole fleet of student-owned endpoint devices—over 7,000—connecting to the network without any kind of centralized management because the university only has the means to manage campus-owned systems. On the […]



By: - IT Security Expert, Author

@stiennon

Three Lessons Learned From the NSA’s Use of Big Data and Security Analytics

August 14th, 2013

Security analytics is the term being applied to the new methods being developed to counter sophisticated targeted attacks. The idea is simple but implementation requires skill sets that have yet to be acquired by most organizations. Gather as much data as possible, apply filters derived from security intelligence, and identify attacks in progress or already […]



By: - Forensics and Security Expert

@phenrycissp

8 Bulletins, 3 Critical for August Patch Tuesday

August 8th, 2013

  IT departments will get a bit of a reprieve this August Patch Tuesday. While 8 bulletins may seem high at first glance, 3 of them are considered critical and just 1 – bulletin 1 – impacts the current code base. With 8 bulletins today, Microsoft’s year-to-date total is 65 patches. For anyone keeping track, […]



By: - Technology Reporter

@jleclaire

To Layer or Integrate? That is the Question

June 27th, 2013

Indeed, the debate over whether to mix a myriad of tools and technologies to create a bulletproof shield that hackers can’t invade or to take an integrated approach to in-depth defense to combat persistent threats is ongoing. But more cyber security analysts are speaking out about the benefits of integration. Also known as layered defense, […]



By: - Information Security Reporter

@kevtownsend

Compliance Is Bad for Security

June 18th, 2013

There are two separate approaches to keeping data safe: compliance and security. The first is a legal/regulatory obligation; the second is not. If you ask a compliance author, whether that’s a government legislator or a bureaucratic regulator, what is the purpose of compliance, the reply will be ‘to ensure security.’ If you ask the same […]


By: - Former Chairman and CEO, Lumension

@pclawson

3 Executive Strategies to Prioritize Your IT Risk

May 22nd, 2013

Every company wants to know the best way to protect their company, but it can be difficult when faced with the evolving security challenges of today. I recently sat down with Richard Mason, VP & CSO at Honeywell, Roger Grimes, security columnist and author, to get their thoughts on risk management best practices. I hope […]


By: - Forensics and Security Expert

@phenrycissp

Push for Centralized Infrastructure and Branch Office Consolidation Will Prove Risky in 2013

December 17th, 2012

My series of 2013 predictions began with more malware and then some thoughts on risk created by quick data center consolidations. Furthering the idea of consolidation, I also think centralized infrastructure and branch office trends will create additional risk in the new year. Historically, our network infrastructures have been handled in a decentralized manner. Meaning, […]


By: - Dir. Solutions Marketing

For Want of a Nail …

November 14th, 2012

… the kingdom was lost. This real-life cautionary tale, told to me by my colleague’s brother (let’s call him Mr. X), concerns a risk-reward decision gone awry. X’s company is a good-sized global in international construction services company with over $1B in revenue and around 5000 employees; they have about 7000 servers and endpoints under […]


By: - Former SVP Global Marketing

@cedwardbrice

Security Simplified at SecuritySCAPE 2012

September 27th, 2012

All good things must come to an end, and unfortunately the same goes for SecuritySCAPE 2012. To everyone who participated, thank you. I hope you enjoyed the event and walked away with new knowledge, ideas and tools to combat the constantly changing threat landscape. If you missed any of the sessions, you can view all […]


By: - Former Chairman and CEO, Lumension

@pclawson

IT Security Can Be Simple; SecuritySCAPE Will Show You How

September 24th, 2012

When attempting to develop an endpoint security strategy, administrators often face a plethora of complicated questions: Do I still need AV? How can I ensure compliance? How do I secure machines for remote workers? Is there a way to secure multiple operating systems with one solution? With so many seemingly unrelated elements to consider, deploying […]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com