Two weeks ago a new book called “Preventing Good People From Doing Bad Things” was published by Apress Media, and I even published the top 10 reasons to buy the book last week in this blog, but why take my word for it when you can look to those independent reviewers for unbiased insight?. Bob…
Virtual apps, and specifically those deployed by market leading VMware’s ThinApp technology, are becoming increasingly popular in the financial services and healthcare-related fields, as well as with government agencies. Why? The technology allows IT teams easily streamline application mobility and eliminate application conflicts on the desktop, which at the end of the day, means…
As we discussed several times, enterprise IT security isn’t easy. As recent article at Dark Reading makes clear, part of the reason is that even the smallest flaw can lead to a major security breach.
Most companies fear the cost of data breaches more than anything, while others fear the embarassing negative publicity wich can have even great negative impact on their organization when misuse of privilege makes the national news.
|Vendors:||Apache Software Foundation
|Exploit Impact:||Elevation of Privilege
In early September BeyondTrust CMO Brian Anderson covered the news around Stanford Hospital & Clinics medical privacy breach that resulted in 20,000 patients’ personal data being publicly available on a website for nearly a year. At the time the breach was first reported by The New York Times, it was unclear how the data made it onto the website.
With all the data breaches in the news these days, security is definitely a hot topic in the information technology community. Preventing risks and threats is the core of keeping information, and ultimately people, safe.
Last week talked about the basics of how you can address the risk of insider attacks from former employees. A recent study of IT managers and network administrators conducted by Amplitude Research on behalf of VanDyke Software, shows a growing concern about insider threats, particularly unauthorized access by current and former employees. Unauthorized access by current and former employees was cited by 11% of the survey respondents, as a reason cited network intrusions, the 4th most frequent response.
I recently read an article talking about the US Government wanting to start monitoring regional internet traffic on a large scale as a way to predict human behavior. The article goes on to state this, “…could enable the prediction of economic crises, political unrest and revolutions…” Wow! Good luck with that.