By: - Forensics and Security Expert

@phenrycissp

XP End of Support Options

March 17th, 2014

The end of support for Windows XP has disastrous potential for those who do not prepare for it. Anyone still on the OS can expect an onslaught of malware after April 8th, 2014 – the date Microsoft will no longer ship security patches for XP. Any bad guy out there with an XP exploit will [...]



By: - Technology Reporter

@jleclaire

Managing Security Risks in a Virtual Environment

February 4th, 2013

Before virtualization even became an official buzzword, IT industry watchers began pointing to its security risks. Now that virtualization is mainstream, few will come out and say virtual environments are inherently less secure—but there remains a tendency to deploy virtual servers and virtual desktops insecurely. Of course, with that tendency comes the potential for security [...]



By: - Forensics and Security Expert

@phenrycissp

Consolidated Data Centers Will Create More Risk in 2013

December 12th, 2012

I began my series of 2013 predictions with the obvious – malware will march on. I also think the rush to cash in on savings promised by moving from physical server realms to virtual environments (by both IT departments and security vendors) created unfortunate shortcuts and therefore it is an area ripe with risk. For [...]



By: - Forensics and Security Expert

@phenrycissp

Where Did We Fall on 2012 Predictions?

September 19th, 2012

About this time last year, I wrote out my predictions for the good, bad and ugly of 2012. While pulling together what I think the 2013 IT security landscape will look like (which is the topic of my SecuritySCAPE 2012 presentation and subsequent blog posts here on Optimal Security), it’s always interesting to first look [...]



By: - IT Secured. Success Optimized.

@_lumension

2012 Endpoint Security Trends

December 5th, 2011

video

What’s in Store for 2012? A new year brings a new IT security landscape and smart IT pros are planning ahead. To find out more about what 2012 will look like and what IT departments can be doing now to prepare, Lumension asked three experts to make their predictions and offer practical steps on what [...]



By: - Chairman and CEO, Lumension

@pclawson

What Security Companies Can Expect in 2012

December 5th, 2011

‘Tis the season for predictions….and here’s an obvious one. Security manufacturers definitely have their work cut out for them in 2012. (Also listen to the podcast with Paul Henry and Randy Franklin Smith.) IT has big concerns about what the coming year will bring. In our newly-completed State of the Endpoint survey conducted by the [...]



By: - Chairman and CEO, Lumension

@pclawson

2012 State of Endpoint Report Is In – Embrace Change to Win on Security

November 17th, 2011

It seems like only yesterday when I was excited to share the results from our 2010 report on the state of the endpoint. This week, we are releasing data from our third annual State of the Endpoint study conducted by the Ponemon Institute and I have to admit, this year’s data is even more intriguing, [...]



By: - Forensics and Security Expert

@phenrycissp

7 Trends to Watch for in 2011

December 13th, 2010

In 2011, the threat landscape will continue to evolve. Here are 7 trends that have a high probability of happening. 1. State-sponsored cyber crime will become a regular occurrence It all started with China and the Google hacks (APT) and reared its head again  with Stuxnet. It’s no longer your disgruntled employee or even the [...]



By: - VP of Security Technologies

Reasons to Consider Power Management in Your Enterprise

June 22nd, 2010

Chris Andrew, VP of Security Technologies for Lumension, shares his thoughts on power management considerations. What are some best practices to implementing PC power management in midsize and large enterprises? The average computer is left on all the time in a business environment, and that can waste a tremendous amount of power when you factor [...]



By: - Forensics and Security Expert

@phenrycissp

2010 Predictions Redux- 2nd Half Predictions and Looming Threats

June 22nd, 2010

As we ended 2009 and entered 2010, many predicted that 2010 was poised to go down in history as “the year of insider threats”. It was not a risky prediction to make considering our economic peril and our industries continued unwavering albeit misplaced focus on the gateway rather then endpoint security. The Worldwide State of [...]


By: - Product Marketing Executive, Mobile and Security Technologies Expert

@jeffreyfhughes

The Case for Endpoint Operations and Endpoint Security Convergence

May 24th, 2010

Ask any IT administrator where their greatest security risk lies and they will tell you it’s at the endpoint. The endpoint has expanded well beyond a desktop to include mobile devices, which allow greater user flexibility and productivity but also increase security risks to your network. Data that once resided on secure centralized servers (and [...]


By: - Product Marketing Executive, Mobile and Security Technologies Expert

@jeffreyfhughes

Six Critical Elements to Achieve Economies in FISMA Compliance

February 3rd, 2010

We recently sat down with Michael Rasmussen, President and Risk & Compliance Advisor at Corporate Integrity, to discuss how public sector organizations can meet the requirements of FISMA in a cost-efficient but effective manner. Q. How are public sector organizations adapting to FISMA compliance and why is this critical? A. Federal agencies are trying to [...]


By: - Chairman and CEO, Lumension

@pclawson

The Worldwide State of the Endpoint: What Organizations Should Pay Attention to in 2010

November 17th, 2009

We’ve been discussing how unprepared organizations in the U.S. are for cyber attacks, and now there’s new research that backs up these concerns and illustrates the inherent weaknesses that must be addressed if we’re to adequately safeguard our information and vital systems. A new Ponemon-Lumension survey on the worldwide state of the endpoint shows that [...]


By: - Chairman and CEO, Lumension

@pclawson

Operationalizing Endpoint Security: Striking a Balance between IT Operations and IT Security

September 24th, 2009

Gartner recently released a report on operationalizing endpoint security – on how signature-based anti-malware is losing effectiveness in the face of an overwhelming volume of threats. I have a few thoughts about the report’s findings and what organizations can do to better protect their endpoints. As the Gartner report made clear, signature-based anti-malware is losing [...]


By: - Sr. Director Solutions and Strategy

@donleatham

Server Virtualization: Are We Doomed to Repeat the Security Sins of the Past?

May 21st, 2009

Here is an experiment for you to try.  Go to google.com and type in the term “server virtualization” but don’t press ENTER.  If “Google Suggestions” is working you should see a ranked list of about ten suggested searches that Google Suggestions creates from the “… relative popularity of common searches…”.  When I did this test [...]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com