BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘business intelligence’

retina-insight1-680x316

Exploitability in Context

Every year there are literally tens of thousands of new vulnerabilities discovered across the various software and hardware technologies we rely upon every day. Simple math would seem to dictate an impossible task to manage all of these vulnerabilities and to make the real-world, priority-based decisions on them. Vulnerability management is one thing, but for…

Post by Alejandro DaCosta March 28, 2012
Tags:
, , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
img

Big Data? Is There Any Bigger Data Than Your Security Data?

The idea of “big data” has technology vendors and customers alike scrambling to come up with ways to manage the limitless amounts of data being generated by apps, API’s, databases, web services, etc. For organizations with aggressive security and compliance requirements, the security data driving today’s modern threat and risk intelligence (assessments, compliance reports, attack…

Post by Morey Haber November 22, 2011
Tags: