Security Policy Management

1 02, 2012

New Security Management Guidlines from the SEC

By | February 1st, 2012|Security Policy Management|0 Comments on New Security Management Guidlines from the SEC

The Securities and Exchange Commission (SEC) released a guidance document that strongly suggests companies pay more attention to "assessing the impact of cyber security attacks and its outcome; especially as it relates to weaknesses in the security posture and preventive measures of the organization."
1 11, 2011

Is Your Security Management Program Like Whack-A-Mole?

By | November 1st, 2011|Security Policy Management, Vulnerability & Threat Management|0 Comments on Is Your Security Management Program Like Whack-A-Mole?

Using an automated tool like Risk Control to prioritize vulnerabilities according to real network topology and risk factors helps you predict the most damaging ‘moles’ in advance and retire them before they are exploited by an attacker.
11 10, 2011

Five Best Practices to Reduce the Chance of a Cyber Attack

By | October 11th, 2011|Security Policy Management, Vulnerability & Threat Management|0 Comments on Five Best Practices to Reduce the Chance of a Cyber Attack

Check out these basic best practices that, if followed in a timely manner, can reduce the number and potential severity of security gaps that could be exploited.
9 09, 2011

Combating APTs: Are There Gremlins in Your Network?

By | September 9th, 2011|Security Policy Management, Vulnerability & Threat Management|0 Comments on Combating APTs: Are There Gremlins in Your Network?

Perpetrators of APTs are patient and well -- persistent. If there is a security gap (and whose network doesn’t have one) they will find it. But before you lose hope, there are steps you can take to significantly lower the risk of attack or focus your limited IT security resources to shine a spotlight on suspicious activities.
16 08, 2011

Cisco’s 2011 Global Threat Report: A Response and a Call for an “Advanced Persistent Security” Approach

By | August 16th, 2011|Security Policy Management, Vulnerability & Threat Management|0 Comments on Cisco’s 2011 Global Threat Report: A Response and a Call for an “Advanced Persistent Security” Approach

There are two vital elements and a mindset that security professionals should consider when protecting their organization from APTs: Proactive Risk Reduction, and Automation.
2 05, 2011

Troubleshooting Network Connectivity

By | May 2nd, 2011|Security Policy Management|0 Comments on Troubleshooting Network Connectivity

Modern network access and visibility systems, like Skybox Network Assurance, can do this for your network. They capture network topology and traffic rules by reading firewall and router configurations. The routers and other devices know what devices surround them so the network links can be deduced automatically to generate a network map.
28 02, 2011

Next-Generation Firewalls, Cybercriminals, & Firewall Management Tools – SC Mag Interview at RSA, 2011

By | February 28th, 2011|Firewall Management|0 Comments on Next-Generation Firewalls, Cybercriminals, & Firewall Management Tools – SC Mag Interview at RSA, 2011

Illena Armstrong, the Editor-in-Chief of SC Magazine, took some time to interview Michelle Johnson Cobb, VP of Product and Worldwide Marketing at Skybox Security, on the floor of RSA this year.
18 02, 2011

Next-Generation Challenges: Lessons Learned at RSA, 2011

By | February 18th, 2011|Firewall Management|0 Comments on Next-Generation Challenges: Lessons Learned at RSA, 2011

“Next Generation” was probably the most popular term at the RSA conference this week. Many vendors announced or re-announced their solutions and reclassified them as “Next Generation” security solutions for a variety of emerging IT technologies and trends such as mobile computing, cloud architectures, virtualization, application and user aware firewalls, etc.