- Australian security technology spend outpacing rest of world: Gartner
- Gartner reveals Top 10 IT security myths
- Security budgets stagnant, execs must put money where their mouths are: Gartner
Start-up CrowdStrike today made available its first product, called Falcon, designed to detect and block stealthy infiltrations of Microsoft Windows or Apple Macintosh-based endpoint machines and servers.
Australian organisations are snapping up security technology and services much faster than their peers around the world, according to new figures from Gartner.
Security monitoring -- the type involving traditional security information and event management (SIEM) -- can be done in some public Cloud environments, according to Gartner. And if you're using public Cloud services, it's time to think about doing it.
The global market for security and services will rise to $67.2 billion (£45 billion) in 2013, with further stellar growth taking that as high as $86 billion by 2016, Gartner analysts at the firm's Security & Risk Management Summit have predicted.
Adm. Mike Mullen, U.S. Navy (retired), called the leaks coming from former CIA employee Edward Snowden about the National Security Agency's role in intelligence collection a "huge breach" that undermines the country's security.
When it comes to information security, there are a lot of "misperceptions" and "exaggerations" about both the threats facing businesses and the technologies that might be used to protect their important data assets, according to Gartner analyst, Jay Heiser.
China is by far the most aggressive, but not the only, country attempting the sort of extensive cyberespionage described in security firm Mandiant's dramatic report, released this week.
Securing a hybrid cloud is not the same thing as deploying hybrid security products.
An assessment of the information security department shows that it has a lot of growing up to do yet.
Earthquakes? Volcanoes? Pandemics? Tsunamis? Are these the stuff of business continuity? Gartner has issued several papers covering major disasters such as the Iceland volcano eruption and its impact on business travel, admitting that “few, if any, businesses plan for a volcanic ash disruption scenario”, which is probably the understatement of the year.
Whitepapers about Gartner
With so many Information Technology solutions available to choose from today, many organizations put their trust in the experience, insight and advice of Gartner, and their industry-leading analysts. Trend Micro’s portfolio of solutions meets and exceeds Gartner’s recommendations on how to devise a server protection strategy. Precisely how Trend Micro does it is detailed in this whitepaper. Read now.
Sign up now »
Ultimate protection for your small or medium-sized business
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.