Cloud-based SIEM frees that one hand tied behind your back

onearmHave you ever been asked to fight the state boxing champion with one hand tied behind your back? Many security professionals face this scenario every day. For many companies with whom I talk, there isn’t a lack of IT talent when it comes to security–just a lack of hours in the day, computing resources and necessary headcount with specific expertise to change the culture from reactive to proactive and strategic risk management.

READ THE ENTIRE CLOUD BASED SIEM ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

Supporting CIO strategies and priorities from the cloud-Part 2

Chess2This is the second part of a two-part article entitled Supporting CIO Strategies and Priorities from the Cloud. In case you have not done so, READ PART 1. However, to briefly recap: in support of a recent Gartner study that basically states that the function of the modern CIO is in flux and that his or her future focus must incorporate digital assets (aka cloud-based data and applications) to remain relevant, I have taken their listed priorities and illustrated how they could securely work in a cloud-centric model.  Part 2 of 2

READ THE ENTIRE ARTICLE AT OUR NEW CLOUD ACCESS BLOG SITE: HERE

Supporting CIO strategies and priorities from the cloud-Part 1

CIO strategyMost CIOs recognize that the future of enterprise IT lay not with sitting and writing code and patching servers, but rather one of strategic development and as an integrator of business goals: riding the sea change from a person plugging in cables to an analyst; from a compiler of stacks to a broker of business needs. Part 1 of 2

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

 

Sailing the 7 C’s of security monitoring

7 seas cloudOne of the established best practices in InfoSec is monitoring. People, products and companies get paid a great deal of money and expend a great deal of resources to watch pots. Monitoring simply is the central component to any security initiative. But with all best practices, there are variables. How much to monitor? What priorities matter? Where are my greatest vulnerabilities? To this end, I have boiled down monitoring to 7 best practices…The 7 C’s of security monitoring:

READ THE ENTIRE ARTICLE ART THE NEW CLOUD ACCESS BLOG SITE: HERE

The New Standard: Intelligence-Driven Security

braincloudNetwork perimeters are all but erased and traditional security strategies such as stacking don’t adequately address the current needs of a modern enterprise. Many companies are still using strategies rooted in 2002 technologies and approaches. As Exec Chair at RSA Art Coviello wisely noted, “IT organizations have continued to construct security infrastructures around a disintegrating perimeter of increasingly ineffective controls.” A new intelligence-based security model is one that integrates several alerting, analytical and preventative tools into a central monitor and management best practice.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

How cloud security balances risk versus reward

riskrewardSecuring your IT environment is not free, but there are new (cloud) options designed to mitigate costs while still providing a strong, manageable and proactive defense. While many companies still would rather spend capital on commodity assets, many CIOs recognize that information security is an important business driver…but the ultimate question is where is the balance between how much exposure can a company afford against the dollars needed protect it. The answer is different for every company, but there are best practices and alternate deployment technologies that can readjust the scales of risk versus reward.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

It’s a Wonderful Cloud-a Security Carol

xmasTwas the night before Christmas
and all through the net
No access was stirring;
No hackers as yet.

READ THE ENTIRE POETIC TRIBUTE TO SECURITY AT THE NEW CLOUD ACCESS BLOG SITE: HERE

When is a stack not a stack? When it’s Unified in the cloud

unifyAll the right tools do not necessarily give you the best visibility across your enterprise–you’ve got SIEM, you employ log management. You even have access and or identity management. Each performs a specific security function for your enterprise, but unless they are working across all your information silos and collaborating their collective capabilities, you still might have vulnerability gaps…like a thoroughbred running with blinders.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

Preventing Data Leakage: Proactive Security from the Cloud

The lack of a proactive security strategy is much like an ostrich putting its head in the sand. It is a matter of when, not if attacks will happen. As enterprise systems are exposed to substantial risk from data loss, theft, or manipulation, a proactive unified approach deployed and managed from the cloud can provide a better balance of data leakage prevention, protection of IP assets, maintenance of compliance standards versus cost/resource responsibility.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE