Flagship Security Blog

The Answer to Endpoint Detection and Response

According to Gartner… “Organizations with security budgets of $10 million or more use an average of 13 security vendors (the average across all enterprises is about 9 vendors), too high a number for most organizations. Indeed, about 90% of surveyed enterprises...

Threat Intelligence – A Sight for Sore Eyes

They say, “hindsight is 20/20,” because it’s always easier to see the “would’ve”, “should’ve,” “could’ve’s” after the fact. Seeing the holes, the cracks and the mistakes in a security plan...

Employees Don’t Want to Deal with Mobile Security

According to Forrester’s Global Business Technographics Devices And Security Workforce Survey, 2016, 44% of employees think their employer should handle mobile security on their device and 26% of employees said they prefer to choose a security solution on their...

The Four Leading Security Threats of 2017

Contributor: Rick M Robinson, via securityintelligence.com The security landscape is constantly evolving and will continue to evolve in 2017. Long-standing security threats will take on new dimensions. Social engineering, for example, will become an output as well as...

The Role of Managed Services in Cybersecurity

Organizations have traditionally turned to managed services for assistance in making technology investments, and achieving greater operational efficiencies. Recently, managed service providers (MSPs) have been primarily focused on helping their clients navigate the IT...

Lock Down While Opening Up Your Cognitive Business

The Part of Cognitive Business That’s Changing Everything It’s no surprise that the Cognitive Business era is coinciding with the dawn of the Internet of Things. Data growth is enormous now, and IoT will usher in an age of everything from connected cars to service...

Ten Common Mistakes in Computer Security Incident Response Plans

In a previous blog, we introduced the importance of a Computer Security Incident Response Plan (CSIRP). We reminded our readers that security breaches are virtually inevitable, and can involve thousands of data records while costing millions of dollars. A CSIRP can...

Responding to a Cybersecurity Incident – Dos and Don’ts

Global enterprises with hundreds of thousands of employees, small companies doing business on the web and public sector organizations of any size all have one thing in common: your networks are under almost continual attack, and your enterprise systems are at risk as...

Angie – 1, Scammer – 0

A crazy thing happened to me this morning. As I started my day, I read and shared an article about a group of cybercriminals that were recently caught and charged by the Federal Trade Commission (FTC) for creating a program which freezes the victim’s computer...

‘Pokemon Go’ and Five Security Requirements for Using Cloud Apps

Contributor: Mark Campbell, Cloud Security, IBM If you haven’t played the new “Pokemon Go” game yourself, someone close to you definitely has. The game has gone viral since its release, and it has people out in droves wandering around neighborhoods looking for...

Enabling Mobility While Protecting Corporate Data

Blog Series: IT Perspectives by Jaqui Lynch Mobile Devices For the past three days I have been in upgrade turmoil. There are two people in this house and between us we have three desktops, four laptops, two IPADs, two iPhones and2 iPods. All of these need upgrading at...

Endpoints: The Beginning of Your Defense

Contributor: Charles Kolodgy, Senior Security Strategist, IBM The term endpoint conveys a terminus — the end of the journey. However, for IT endpoints, be they computers, mobile devices, servers, point-of-sale terminals or a myriad of other devices belonging to the...

Minimizing the Data Breach “Cost of Doing Business”

Cyber-crime is becoming an increasing challenge with the frequency and sophistication of cyber-attacks growing. Even worse data breaches are often detected by outsiders, affecting customers or brand image before the organization even knows that they have been...

Mobile Device Management – Denial is not a Strategy

Still think smartphones are a fad? Are you convinced that tablets have just about run their course? Are you of the opinion that people shouldn’t be doing work wherever they go, anyway? Do you see yourself as a lone crusader for LYOD (leave your own device)? “Denial...

Strategies for Securing Your Business – Part III

Blog Series: IT Perspectives by Jaqui Lynch Exploring QRadar In my previous blogs, Strategies for Securing Your Business – Part I & II, I talked about some of the new roles in security along with some of the things to think about with respect to security including...

Strategies for Securing Your Business – Part II

Blog Series: IT Perspectives by Jaqui Lynch In our initial security blog we talked about what is meant by security and what kinds of assets need to be protected. One of the items mentioned was the detection and prevention of threats. In this blog we will discuss an...

Strategies for Securing Your Business – Part I

Blog Series: IT Perspectives by Jaqui Lynch This is the first entry in a series of blogs covering the role of security in businesses today. When people talk about the fastest areas of growth in IT today we automatically think about cloud, mobile, social media and web...

What Good is a Cyber Security Strategy with Blind Spots?

Vulnerability management activities have long been a core requirement for organizations seeking to understand the extent of their exposures and overall security state of their networks. Yet many security teams continue to struggle when faced with the operational...