Posts Tagged 'security'
No organization will ever be impervious to breaches, but efficient organizations can lower their overall spend. The intense demand for trained information security and privacy practitioners is reflective of the convergence of technology, productivity, and profitability. CIOs and CISOs that balk at enabling more mobile, cloud, and Internet of Things (IoT) tools not only find […]
We need security solutions that are designed from the ground up to operate in today’s dynamic environment. The idea of a network perimeter is quickly morphing into something more complicated. We work outside of the corporate network on our own devices, storing and moving things through clouds of applications, storage, and service providers. How will […]
It doesn’t have to. We just need to apply the compensating safeguards and automated controls selectively so CISOs and their security teams can comfortably embrace it. Although many CISOs see automation as a necessity to deal with limited resources and increasing workloads, there is a lingering reticence to adopt it widely because their security staff […]
The credit card is a powerful tool — it’s thin, portable, and, thanks to a small magnetic strip on the back of the card, gives you immediate access to credit or cash at a moment’s notice. While the concept of credit and charge cards has been around for ages in various forms, it wasn’t until […]
Software tools are available from our consultants free of charge. When our Foundstone consultants are working at customer sites, they sometimes realize that they can perform a task better if they write some code. They might want a tool that scans for vulnerabilities or malware, helps with forensic analysis, or tests security settings. After the […]