Security

CISOs, ‘It’s Not Complicated’

Too many executives still see information security as a technical problem and believe that simply buying the right security widget will cause the problem to go away...

The "It's Not Complicated" campaign from AT&T has produced some of the best TV advertisements I have seen in quite some time. I would love to do a similar advertisement campaign and gather some CISOs around a table and ask, “Who thinks more is better than less?” and have a CISO respond by saying more is better than less because we want more! We like it, so we want more!

Pop Quiz: How Well Do You Know Your Vendors?

A look at some recent data breaches where attackers entered via a third party...

Pop Quiz: How Well Do You Know Your Vendors?

Do you have one, 100, 1,000, 10,000 or more vendors? Do any of them process, store and transmit your sensitive data?  Are they taking the same precautions with your data that you do?

These are great questions and ones that too often are difficult to answer. That’s because many organizations have no visibility into their vendor ecosystem, let alone visibility into contractors and sub-contractors.

WWT Security Director Talks Cyber Threats Ahead of Info Sec Nashville

Mario Balakgie, director of WWT's National Security Practice, shares his thoughts on how organizations can defend themselves against cyber attacks.

More than 500 IT and security professionals will meet at Info Sec Nashville Sept. 25 to learn about the latest trends in cybersecurity. Among presenters at Info Sec Nashville is Mario Balakgie, World Wide Technology’s (WWT) National Security Practice Director, who will lead a breakout session on infrastructure threats and response. In advance of Info Sec Nashville, Balakgie shared his thoughts on how organizations can defend themselves against cyber attacks in a podcast from TechnologyAdvice.

What Will the Cyber Breach Be Today?

It doesn't matter which news source you subscribe to, it seems like every day the news is reporting there has been a breach..click here to read more...

One of the books I used to read to my youngest son was What Will the Weather Be Like Today? The book rhymed and was fun to read. Now, I often find myself asking, “What will the cyber breach be today?”

It doesn’t matter if it’s CNBC, The Wall Street Journal or various other news sources, it seems like every day the news is reporting there has been a breach.

WWT Prepares National Guard for Cyber Attacks

WWT recently assisted Colorado and four other National Guard units with cyber defense scenarios. Read more...

With the threat of cyber attacks against state and utilities assets on the rise, the National Guard has been rapidly forging their Cyber Network Operations (CNO) and Cyber Network Defense (CND) capabilities to protect our nation’s critical infrastructure.

ISE Helps Achieve at Least Half of SANS 20 Critical Security Controls

ISE Helps Achieve at Least Half of SANS 20 Critical Security Controls...click here to read more...

RSA NetWitness: An Anatomy of an Attack

According to WWT Security Architect, Aamir Lakhani, RSA NetWitness offers a real time view of threatening events on your network, and if you miss something in the moment, you can go back and review every detail of an attack...read more

 

WWT's Security Blogger Defines and Explores Network Policy

Network policy is an under-utilized element of corporate IT planning, according to WWT's cyber security solutions architect, Joey Muniz... read more

Fresh Infographic Introduces WWT's BYOD Team

Solving BYOD doesn't mean building a space ship! It means calling WWT's BYOD team...read more

BYOD by WWT:

Lab Work: WWT's Security Blogger on Zenprise Mobile Device Management

WWT's own Joey Muniz takes a deep dive in a fast-growing area of BYOD: Mobile Device Management (MDM)...read more

Mobile Device Management (MDM) is a phrase coming to prominence of late, with the surge in BYOD activity and organizations scrambling for a single pane of glass to handle all the devices on their networks.