

Compliance and financial risk used to be the driving concerns for security and risk management. Audits and governance processes were predictable events that IT attempted to minimize and automate. Risk was a fairly static concept.


This whitepaper presents best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs.


Cloud computing … mobile devices … web applications… virtualization. It seems there are backdoors into your systems from every direction. And that’s before you’ve even considered the threat presented by the very applications your end users need to get their jobs done. Third-party applications...


As a security provider, we understand that convincing executives to make changes to their stack can be difficult. It’s important to clearly demonstrate return on investment (ROI) for any security build out, so that your team becomes more effective with every dollar committed.
It’s important that...


Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to...


Enterprise IT organizations are challenged by accelerating data growth and increasing reliance on the data. This requires a fundamental rethinking of how data is protected and accessed. HP StoreOnce backup and CommVault Simpana deliver an integrated, end-to-end data protection and rapid recoverability solution to enhance...


There are three important truths in today’s cyberlandscape:
First, your company is the custodian of valuable, confidential data, applications and IT infrastructure that drive nearly half of all economic activity.
Second, all companies face the same security threats.
And third, you are challenged...


A new FireEye white paper, “Thinking Locally, Targeted Globally - New Security Challenges for State and Local Governments,” outlines the severity of the problem facing state and local agencies and details three critical steps you need to take to protect your organization.


Attacks don’t operate in silos, but many security programs do. Fragmented security technologies and inefficient event response leave organizations severely vulnerable to sophisticated threats.
To be successful, organizations need to combine accurate, integrated network security with a consolidated, intelligent...


The attacks can and do hit organizations of all sizes and are only becoming more widespread and difficult to detect. The consumerization of IT and Bring Your Own Device (BYOD) only exacerbates the issue since companies now have many more endpoints to protect—many of which they don’t own.
In a survey of...


In the changing landscape, security and risk management leaders must ensure that existing security solutions keep pace with fast-changing threats. It’s clear that the defend-the-perimeter model of security hasn’t worked for years and it’s time to make a change—and today that means starting protection...
Published: Jun 17, 2021


In this installment of a series of white papers about the true cost of DDoS attacks, StamSOC (Staminus Security Operation Center) will discuss the history of these attacks, the wide reaching impacts, and the true costs associated with DDoS attacks.
Business operators often overlook the repercussions of DDoS attacks....


When a cyber attack or other security incident occurs, CISOs and their security teams must be able to explain the details of the incident to senior management. Often without being given the time to gather the necessary intelligence to provide an accurate assessment of the problem.


With malware attacks growing more sophisticated, swift, and dangerous by the day — and billions of dollars spent to combat them — surprisingly few organizations have a grip on the problem. Only 20 percent of security professionals surveyed by Information Security Media Group (ISMG) rated their incident response...