Enterprise Security Archives - HyTrust
https://www.hytrust.com/uploads/cont_comp_header.png

Enterprise Security

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

Thank You, Dr. Amoroso, for Making 3 Smart Cybersecurity Recommendations to the President-Elect

In what is likely the first open letter to President-Elect Donald J. Trump from a member of the U.S. cybersecurity community, an industry leader has made three smart recommendations regarding the nation’s security defenses—including choosing one standard security compliance framework (NIST), reducing dependence on enterprise perimeters, and expanding the educational Cyber Corps program. HyTrust applauds […]

Put Your SIEM on Steroids with Granular Monitoring

SIEM (Security Information and Event Management) refers to software products and services that combine security information management and security event management. A SIEM collects log files and allows for real-time analysis of data that helps security analysts take defensive measures. However, the SIEM can only roll up the data it receives from various applications and […]

Venom – Cloud Security Shattering or Shrug-Worthy?

The recently-uncovered Venom security vulnerability can be a nightmare for virtual administrators and cloud service providers. This zero-day flaw is a threat to the multi-tenant nature of the cloud. As the vulnerability resides in one of the most critical components in widely used virtualization software, it allows an outsider to gain access over potentially every […]

Keep Up with the Changing Threat Landscape by Understanding the True Nature of Security

“Security is a journey, not a destination.” Symantec CISO Patricia Titus includes that statement in her email signature as a reminder that we should not lose focus on the big picture when it comes to information security. Too often, companies spend so much time chasing the latest threat instead of stepping back to reconsider how […]

Breaking the Cloud Kill Chain: Why Perimeter Security Is No Longer Enough

Bad actors love admin accounts, especially in the cloud. With the broad permissions afforded these users, they become ideal attack targets allowing attackers to propagate malware, bypass controls and cover their tracks after they’ve wrecked their havoc. Having a measured, structured approach to defending such attacks helps companies to address them in the early stages. […]

Businesses Need CISOs to Bring Both Security and Leadership

Feeling misunderstood and underappreciated is par for the course for information security workers. They only get attention when something goes wrong. And in the boardroom, the problem is exacerbated by a perception of CISOs as glorified admins. For businesses to succeed in implementing strong security, driven by the top-down approach risk managers recommend, they need […]

Addressing IT’s Biggest Security Concerns

Security has become the biggest worry the IT world faces. With a growing number of high-profile breaches and no end in sight, we thought it wise to examine the security issues that concern IT professionals most, ensuring our products are still addressing the security and compliance needs of businesses using virtual systems.

It Can Happen to Anyone: Social Engineering Awareness Must Be a Security Cornerstone

Social engineering penetration tests show the many ways in which hackers can easily trick users and administrators into security lapses. It’s vital to your security program that every user and administrator understands these methods, how they can avoid becoming victims, and what to do if they suspect they have been targeted by a spear phishing […]

We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.