The National Institute of Standards and Technology on Thursday issued two draft publications aimed at securing digital assets: Guide for Security Configuration Management of Information Systems and ...
When it comes to IT security, the typical defensive toolsets garner all the attention: firewalls, antivirus and antispyware apps, as well as intrusion-detection and prevention systems. While they all ...
Guide for Security Configuration Management of Information Systems Your network and client systems are always in a state of flux, so you need a baseline to ensure these systems communicate in a secure ...
IT organizations need to become more effective at running cooperative processes across IT security and operations. IT security groups should influence operational security configuration management ...
To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security ...
Flexagon unifies DevOps automation and configuration management to deliver native, end‑to‑end control for enterprise ...
Last fall, a security researcher discovered four Amazon S3 storage buckets with highly sensitive data such as client credentials and a backup database containing 40,000 passwords. Accenture had ...
Commentary - As computer software has become the backbone of modern civilization, organized cyber criminals, state sponsored cyber attackers and terrorist organizations try to exploit design flaws and ...
Configuration management is a discipline for the ages. It is not new, but it certainly has been in the news lately. Configuresoft recently announced an impressive 47% revenue growth, expanding its ...
Patch-management vendor BigFix last week unveiled software for servers and desktops to let customers perform a range of security tasks, including asset discovery and policy-based access control and ...