Where is the Fire Department for the Data Breach Fire?

Where is the Fire Department for the Data Breach Fire?

The modern-day CIO, CISO and senior management team members engaged in information security are faced with a daunting task. Chris Roberts (@Sidragon1) posted a description of the CISO role which seems accurate for many organizations:

06 Nov 2017

Preventing the Spark of the Data Breach Fire – Part II

Preventing the Spark of the Data Breach Fire – Part II

An enterprise’s breach notification procedures and vulnerability management programs, and need for real-time malware detection and protection, have come under increasing scrutiny in light of the disclosures of the Equifax data breach.

06 Nov 2017

Preventing the Spark of the Data Breach Fire –  Part I

Preventing the Spark of the Data Breach Fire – Part I

The Smokey the Bear wildfire prevention campaign began in 1944 and its message of wildfire prevention remains as relevant and urgent today as it was in 1944. Just ask any American living in wildfire prone states.

06 Nov 2017

Instant response times with IBM BigFix Patch Management

Instant response times with IBM BigFix Patch Management

According to Zion Market Research, the global cyber security market was valued at $105.45 billion in 2015, is expected to reach $181.77 billion in 2021, and is anticipated to grow at a CAGR of 9.5% between 2016 and 2021.

06 Nov 2017

Why SCCM alone can't manage mobility demands

Why SCCM alone can't manage mobility demands

One of the biggest risks to enterprises is the remote user; especially the remote user who is on public Wi-Fi and never in the office.

06 Nov 2017

Secure the influx of Mobile Devices entering the workplace

Secure the influx of Mobile Devices entering the workplace

In August 2016 Navin Shenoy, corporate VP and general manager for the client computing group (CCG) at Intel said “the average household has ten connected devices.

06 Nov 2017

Reduce Time to Security Compliance from Days to Minutes

Reduce Time to Security Compliance from Days to Minutes

Information security continues to be a relentless foot race against cyber criminals.  However, the busy CISO has daily worries too – approving and delivering security solutions but, also responding to a myriad of compliance requirements.

06 Nov 2017

ITSM platform migration for streamlined IT ops

ITSM platform migration for streamlined IT ops

An outdated ITSM environment is more than just a source of frustration; it’s a liability. But organizations may put off the task of migrating to a more modern one because of concerns over disruption and downtime.

03 Nov 2017

Orchestrate SECOPS for higher business value

Orchestrate SECOPS for higher business value

Cybersecurity is a vital component for all enterprises. Not only do you need to protect the systems and data generated through your daily business activities, but also the data you collect from your customers.

03 Nov 2017

Enable Better Service Operations by Anticipating Solving Problems

Enable Better Service Operations by Anticipating Solving Problems

When all is said and done, the purpose of IT service is to deliver more value to your customers. Without your customers, you don’t have a business, and without technology that’s up, active and improving, you’re not giving your customers the best experience they can have.

03 Nov 2017