As Mobile Security Challenges Mount, How Can CIOs and CISOs Eliminate Blind Spots?
|
|
What separates a great Major League Baseball hitter like David Ortiz from some run-of-the mill player? Great eyesight and intelligence. Ortiz sees more than others and takes all of the rich information he sees to make an intelligent, actionable decision to swing a baseball or not. While lots of players claim to do this, only a few have the right combination of the two to separate themselves from the field.
The same thing can be said for IT security. It takes visibility across the entire attack spectrum, plus analytics and real-world insight, to provide actionable threat intelligence. Many vendors claim to have threat intelligence, but they operate by looking for anomalies in the network to flag something that might be a breach. This can be valuable, but it addresses only part of the security continuum.
To read this article in full or to leave a comment, please click here
ZDNet |
Execs admit 'blind spots' hurt network security: report
ZDNet Chips under the skin: Biohacking, the connected body is 'here to stay' · Beyond Stuxnet and Flame: Equation 'most advanced' cybercriminal gang recorded · Bug bounties: 'Buy what you want' · Terrorist encryption tools nothing more than 'security cape … |
Cab drivers participating in “Taxis on Patrol” are like a “Neighborhood Watch on Wheels,” on the lookout for potential suspicious behavior and crimes. Recruiting them for See Something Say Something is not surprising because cabbies see and hear a lot.
Ms. Smith’s blog