Posts Tagged 'security'
It doesn’t have to. We just need to apply the compensating safeguards and automated controls selectively so CISOs and their security teams can comfortably embrace it. Although many CISOs see automation as a necessity to deal with limited resources and increasing workloads, there is a lingering reticence to adopt it widely because their security staff […]
The credit card is a powerful tool — it’s thin, portable, and, thanks to a small magnetic strip on the back of the card, gives you immediate access to credit or cash at a moment’s notice. While the concept of credit and charge cards has been around for ages in various forms, it wasn’t until […]
Software tools are available from our consultants free of charge. When our Foundstone consultants are working at customer sites, they sometimes realize that they can perform a task better if they write some code. They might want a tool that scans for vulnerabilities or malware, helps with forensic analysis, or tests security settings. After the […]
How to identify the appropriate security for your container-based virtual applications. Virtual machines and containers are similar but distinct ways of virtualizing infrastructure to deploy applications. And they have similar but distinct needs for securing those applications. Virtual machines are the most separate and secure method of virtualizing hardware, enforced by hardware. Each virtual machine […]
Automation is key to shorter response times and better containment. Breaches to the right of you, Breaches to the left of you, Breaches in front of you, Broken and plunder’d. (With apologies to Alfred, Lord Tennyson) Hopefully your security outlook is not as bleak as the ill-fated “Charge of the Light Brigade.” Sometimes it may […]