2017 State of Security Operations

| May 25, 2017

article image
Organizations around the globe are investing heavily in cyber defense capabilities to protect their critical assets. Whether protecting brand, intellectual capital, and customer information or providing controls for critical infrastructure, the means for incident detection and response to protect organizational interests have common elements: people, processes, and technology. The maturity of these elements varies greatly across organizations and industries. In this fourth annual State of Security Operations report, Hewlett Packard Enterprise provides updates to the current and emerging capabilities, best practices, and performance levels of security operations as learned from the assessment of organizations around the globe.

Spotlight

SecPod Technologies

SecPod creates cutting edge products to ensure Endpoint Security. We strongly believe in a ‘Strong Defense , not a Weak Cure’ and our products reflect this motto. Our Product Saner provides safe, reliable and scalable vulnerability detection and remediation for enterprise wide endpoints. Being an agent based solution Saner can scan any number of endpoints in under 5 minutes with minimal network bandwidth utilization – thus making endpoint security a daily chore. Saner is complimented by our cloud based service- Ancor that provides security intelligence, vulnerability remediation, endpoint visibility and software reputation service to keep the endpoint up-to-date. IT admins can get a holistic view of organization wide endpoint security state via our monitoring tool Viser. Viser reports are customizable to meet your needs.

OTHER ARTICLES

Delivering on the promise of security AI to help defenders protect today’s hybrid environments

Article | February 20, 2020

Technology is reshaping society – artificial intelligence (AI) is enabling us to increase crop yields, protect endangered animals and improve access to healthcare. Technology is also transforming criminal enterprises, which are developing increasingly targeted attacks against a growing range of devices and services. Using the cloud to harness the largest and most diverse set of signals – with the right mix of AI and human defenders – we can turn the tide in cybersecurity. Microsoft is announcing new capabilities in AI and automation available today to accelerate that change. Cybersecurity always comes down to people – good and bad. Our optimism is grounded in our belief in the potential for good people and technology to work in harmony to accomplish amazing things. After years of investment and engineering work, the data now shows that Microsoft is delivering on the potential of AI to enable defenders to protect data and manage risk across the full breadth of their digital estates.

Read More

Security by Sector: Medical IoT Gets Much Needed Dose of Cybersecurity

Article | February 20, 2020

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why? Information security risks and challenges in the healthcare industry are well documented and much maligned. There are several reasons why the healthcare sector is particularly vulnerable, but one of the chief causations is the high amount of connected yet insecure devices commonly used within hospitals, clinics and medical centers. For example, a report from researchers at healthcare cybersecurity company CyberMDX discovered that connected medical devices are twice as likely to be vulnerable to the BlueKeep exploit compared to other devices on hospital networks.

Read More

Critical Gaps Remain in Defense Department Weapons System Cybersecurity

Article | March 13, 2020

While the U.S. military is the most effective fighting force in the modern era, it struggles with the cybersecurity of its most advanced weapons systems. In times of crisis and conflict, it is critical that the United States preserve its ability to defend and surge when adversaries employ cyber capabilities to attack weapons systems and functions. Today, the very thing that makes these weapons so lethal is what makes them vulnerable to cyberattacks: an interconnected system of software and networks. Continued automation and connectivity are the backbone of the Department of Defense’s warfighting capabilities, with almost every weapons system connected in some capacity. Today, these interdependent networks are directly linked to the U.S. military’s ability to carry out missions successfully, allowing it to gain informational advantage, exercise global command and control, and conduct long-range strikes. An example of such a networked system is the F-35 Joint Strike Fighter, which the Air Force chief of staff, Gen. David Goldfein, once called “a computer that happens to fly.” Underpinning this platform’s unrivaled capability is more than 8 million lines of software code.

Read More

How Is Covid-19 Creating Data Breaches?

Article | March 30, 2020

Trevor is working from home for the first time. He loves the freedom and flexibility, but doesn’t read his company’s new BYOD policy. Sadly, he misses the fact that his home PC is not protected with updated security software nor the latest operating system patches. Kelcie’s home PC is faster than the old work laptop that she’s been issued to use during the pandemic. She decides to use a USB stick to transfer large files back and forth between her PCs to speed things up. After a few days, she does all her work on her home PC, using a “safe” virtual desktop app. But unbeknownst to her, there is a keylogger on her home PC.

Read More

Spotlight

SecPod Technologies

SecPod creates cutting edge products to ensure Endpoint Security. We strongly believe in a ‘Strong Defense , not a Weak Cure’ and our products reflect this motto. Our Product Saner provides safe, reliable and scalable vulnerability detection and remediation for enterprise wide endpoints. Being an agent based solution Saner can scan any number of endpoints in under 5 minutes with minimal network bandwidth utilization – thus making endpoint security a daily chore. Saner is complimented by our cloud based service- Ancor that provides security intelligence, vulnerability remediation, endpoint visibility and software reputation service to keep the endpoint up-to-date. IT admins can get a holistic view of organization wide endpoint security state via our monitoring tool Viser. Viser reports are customizable to meet your needs.

Events