This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

Spotlight on Cloud Security

The following is external content provided as a free resource for blog readers.





While the cloud is becoming an underlying assumption of computing, often public cloud services present problems for IT that business managers fail to think through, especially security implications. This paper covers:

  • Cloud security liabilities

  • Identity management

  • Data encryption


Today, nearly all businesses have one foot in the cloud whether they realize it or not. This paper will enable IT to assess their organization's exposure and reap the benefit of public cloud services without creating worry or unnecessary risk.



Request Free!

Space Weather Outlook August 25, 2014 at 03:54AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #14-34 2014 August 25 at 1:41 a.m. MDT (2014 August 25 0741 UTC) **** SPACE WEATHER OUTLOOK **** Summary For August 18-24 Category R1 (Minor) radio blackouts were observed on 21-22 August due to flare activity from active sunspot Region 2149. A category R2 (Moderate) radio blackout was observed on 24 August due to flare activity from active sunspot Region 2151. A category G2 (Moderate) geomagnetic storm occurred on 19 August due to a coronal mass ejection associated with a filament eruption that originated on 15 August. Outlook For August 25-31 Category R1-R2 (Minor-Moderate) radio blackouts are likely for the forecast period (Aug 25-31) due to potential flare activity from active sunspot Regions 2146, 2149, and 2151. A chance exists for a G1 (minor) geomagnetic storm on 26 August due to the arrival of a pair of coronal mass ejections that occurred on 22 August. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

The Future of Backup as a Data Protection Strategy

The following is external content provided as a free resource for blog readers.





With so many technologies and security solutions available, it's difficult for a data manager to know where to begin when it comes to building a safety plan. Iron Mountain offers guidance in the form of five questions any data management professional must ask before getting a backup security system off the ground. The questions reveal advice on:

  • Cataloguing data according to its level of business importance

  • Locating and properly assessing your current data backups

  • Finding the right combination of security services that cater to your needs

  • Weighing the cost of various backup systems

  • Creating the best and most cost-effective tests for a data protection plan


Get a detailed picture of how to begin safeguarding your data against harm, theft, and corruption. Read Iron Mountain's article today.



© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.



Request Free!

The Cost of Inertia: Insight from Data Protection Predictors

The following is external content provided as a free resource for blog readers.





This comprehensive study report follows the observations of IT professionals across several fields of industry as they consider the current state of data management. The study examines the roadblocks that many organizations will face in the coming years as data continues to expand, but also helps readers map their way toward a more secure, more efficient data protection plan. Topics discussed in the study include:

  • Assessing the problems of implementing and maintaining a data safety plan

  • Creating safeguards against lawsuits, damages to reputation, and other disasters

  • Fortifying the infrastructure of your data protection system

  • Choosing the best technological backup tools according to the needs of your company


Hear from business peers as they take a powerful look at where data management stands today and where it will stand going forward. Download the report to take advantage of the study and turn yesterday's experiences into tomorrow's successes.



© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks are the property of their respective owners.



Request Free!

The Essentials of IT Security - Free Kit

The following is external content provided as a free resource for blog readers.





The Essentials of IT Security, brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Security related decisions.



The following kit contents will help you get the most out of your IT Security research:



Request Free!

Mitigating Security Risks at the Network's Edge

The following is external content provided as a free resource for blog readers.





With locations that typically process credit cards, distributed enterprises are at a particularly high risk of suffering data breaches. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.



Request Free!

PCI 3.0 Compliance Guide

The following is external content provided as a free resource for blog readers.





Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI-DSS 3.0. Enabling features of CradlePoint solutions include network segmentation (Ethernet ports, SSIDs and VLANs), stateful firewall, MAC/IP/URL filtering, authentication, encryption, event logging, event alerts, time synchronization, and configuration management from CradlePoint Enterprise Cloud Manager.



Request Free!

Essential Security Trends, Predictions and Recommendations from Fortinet's FortiGuard Labs

The following is external content provided as a free resource for blog readers.





Join FortiGuard Labs', Senior Security Strategist, Richard Henderson as he discusses topics like:

  • Which threat classes are on the rise, and which on the wane

  • The latest botnet/command & control channels to be sure are on your block list

  • Early indications of what and where Cybercriminals may focus on next


Richard provides additional color behind key findings from the midyear report as well as best practice recommendations to be sure are in place. Request now to hear directly from FortiGuard Labs.



Request Free!

Space Weather Outlook August 17, 2014 at 09:53PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #14-33 2014 August 17 at 7:40 p.m. MDT (2014 August 18 0140 UTC) **** SPACE WEATHER OUTLOOK **** Summary For August 11-17 No space weather storms were observed this period. Outlook For August 18-24 No space weather storms are expected throughout the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Magic Quadrant for Identity and Access Management as a Service

The following is external content provided as a free resource for blog readers.





Centrify positioned as a Visionary in the 2014 Gartner Magic Quadrant for Identity and Access Management as a Service.



Request Free!

Privileged Identity Management, Q1 2014

The following is external content provided as a free resource for blog readers.





This report evaluated nine vendors based on 18 key criteria, including current offering, strategy and market presence.



Centrify Server Suite's results:

  • Only solution to earn the highest possible score for its Active Directory bridge functionality.

  • Tied for highest score in privileged session spawning, privileged session recording, and privilege escalation.

  • Highest possible score for customer satisfaction.


Disclaimer: The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.



Request Free!

Windows Least Privilege Management and Beyond

The following is external content provided as a free resource for blog readers.





Devising an enterprise-wide privilege access scheme for Windows systems can be complex. For example, each Window system object has its own access control list and the myriad of OS level rights and integrity levels which can vary by Windows version. For Windows environments it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently. By doing so, IT can restrict administrators so that they can access the servers and resources required to perform their job, and only during the approved times to perform specific tasks.



This white paper examines the security, compliance and efficiency issues surrounding least privilege management for Windows servers, and explains where native Windows tools fall short.



Request Free!

Top 3 Reasons to Give Insiders a Unified Identity

The following is external content provided as a free resource for blog readers.





Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In this report, you learn the eight most significant cybersecurity threats that could impact your organization (at any time), Forbes cited internal threats as No. 3, noting that internal attacks can be “the most devastating” due to the amount of damage privileged users can inflict and the type of data they can access.



Request Free!

Combining the Flexibility of Public-Cloud Apps with the Security of Private-Cloud Data for the Finance Industry

The following is external content provided as a free resource for blog readers.





This white paper explores technologies that combine the flexibility of public cloud apps like Salesforce and Box, with the security and compliance of a private cloud. When deployed as part of an end-to-end data protection program, such an approach can provide the same security and assurances as can be achieved with premises-based applications.



Request Free!

Detecting Heartbleed With RSA Security Analytics

The following is external content provided as a free resource for blog readers.





This short video shows how RSA Security Analytics is able to detect Heartbleed. It walks through the parsers that were updated and results from an impacted system.



Request Free!

Building an Intelligence-Driven Security Operations Center

The following is external content provided as a free resource for blog readers.





This paper details why organizations needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.



Request Free!

Changing the Security Monitoring Status Quo

The following is external content provided as a free resource for blog readers.





The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.



Request Free!

Users Beware: 10 Security Tips to Share with Your Users

The following is external content provided as a free resource for blog readers.





ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to IT admins to share with users so they are more aware of the security traps they face every day.



Request Free!

Prevent Data Breaches with Stronger Email Security

The following is external content provided as a free resource for blog readers.





To fight the onslaught of cyber threats, nothing short of a multilayered security architecture, backed by strict security policies and staff training, can protect an organization. Spam filters, antivirus and anti-malware are the foundation of a comprehensive security apparatus, but new technologies are emerging to aid organizations in their defense.



Request Free!

Exploit Kits: Cybercrime's Growth Industry

The following is external content provided as a free resource for blog readers.





Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.



Request Free!

It's Time Businesses Wake up to Mobile Security Reality

The following is external content provided as a free resource for blog readers.





Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation – if not outright demand – for connection to the office at all times.



Request Free!

Space Weather Outlook August 10, 2014 at 09:51PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #14-32 2014 August 10 at 7:38 p.m. MDT (2014 August 11 0138 UTC) **** SPACE WEATHER OUTLOOK **** Summary For August 4-10 No G1 or greater geomagnetic storms were observed. No R1 or greater radio blackouts were observed. No S1 or greater solar radiation storms were observed. Outlook For August 11-17 No G1 or greater geomagnetic storms are expected. No R1 or greater radio blackouts are expected. No S1 or greater solar radiation storms are expected. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

VoIP Vulnerabilities

The following is external content provided as a free resource for blog readers.





Are you thinking of switching to or investing in a VoIP system for your company? VoIP offers numerous benefits -- ease of use and reduced cost being just two -- but with increased benefits can come increased risk. This complimentary white paper will honestly and succinctly assess the vulnerabilities associated with VoIP systems and then provide you with security guidelines for avoiding security threats during use.



If you're thinking of purchasing a VoIP system, read on and discover exactly how you can get the most out of a new VoIP system, while protecting yourself from vulnerabilities and security threats!



Request Free!

Space Weather Outlook August 03, 2014 at 11:48PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #14-31 2014 August 3 at 9:36 p.m. MDT (2014 August 4 0336 UTC) **** SPACE WEATHER OUTLOOK **** Summary For July 28-August 3 R1 (minor) radio blackouts were observed on 31 July and 01 August. Outlook For August 4-10 A chance for R1 (minor) radio blackouts are possible during the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Symantec Report: Heartbleed

The following is external content provided as a free resource for blog readers.





The Heartbleed bug has become one of the most serious network security problems of the year. This eBook will discuss what the Heartbleed bug is and how your business should respond to it.



Request Free!

Symantec Report: Layered Defense

The following is external content provided as a free resource for blog readers.





With attacks becoming more common, more serious and harder to detect, traditional antivirus software will no longer keep your data safe. A layered defense approach is needed; that is, companies must use multiple tactics at the same time to maintain data security. This paper will discuss the kinds of attacks corporations face and how Symantec's multilayered defenses can help.



Request Free!

Symantec Intelligence Report June 2014

The following is external content provided as a free resource for blog readers.





Read this report to learn more about:

  • Targeted Attacks and Data Breaches

  • Malware Tactics

  • Social Media and Mobile Threats

  • Phishing, Spam and Email Threats






Request Free!