The proper security tools can prevent infection or stop outbreaks, mitigate or reduce losses from malicious events, and even decrease legal liability. These products can also often serve as an excellent source of information about what is happening in your enterprise. Regular review and understanding of the logs produced by these tools and services can enable you to benchmark what is normal and typical for your enterprise, which in turn provides a benchmark to spot unusual or atypical behavior that might indicate an advanced persistent threat or other intrusion.
Correlating log information across various tools and services also provides a timely “pulse” of the threat landscape, which can sometimes have interesting associations to global non-malware-related events. Most importantly, regular review and understanding of the data can help uncover the elusive “black swan” — the types of surreptitious and malicious events that otherwise could fly below the radar.
The Cisco Global Threat Report is a compilation of data collected across four core segments of Cisco Security: ScanSafe, Intrusion Prevention System (IPS), Remote Management Services (RMS), and IronPort. The report is published quarterly in the hopes that it will inspire and motivate you to perform your own in-house analysis on an ongoing basis.
BYOD: User Policy Considerations Questions and key points companies should consider when establishing BYOD policies.
Five Mobile Business Intelligence Traps to Avoid Businesses should avoid these pitfalls as they dive into mobile BI deployments.
Top Six Service Desk Concerns and How to Alleviate Them Examining help desk concerns of top IT decision makers through social media conversations.
With all the new products being introduced to company networks, the opportunity for vulnerabilities and security and compliance complications continues to escalate for IT teams. ... More >>
Today's CIO has a lot to do to make BYOD work, starting with a well-designed policy covering employee privacy rights and a company's right to monitor, access, review and disclose company data. ... More >>
The infusion of personal devices, apps and networks into the corporate environment presents a significant security challenge, and is complicated by the presence of assets not fully under the IT department's control. ... More >>