A Well-Written Scope Document Can Save Your Security Project

With a well-written scope document, your team can work through a creative process that helps everyone come to the same understanding, share their opinions, work out tensions and feel heard.

The post A Well-Written Scope Document Can Save Your Security Project appeared first on Security Intelligence.

Continue reading A Well-Written Scope Document Can Save Your Security Project

Making the Case for Network Segmentation in AWS

Reading Time: 4 minutes Network segmentation, a concept that dates back to the start of enterprise IT systems, is now a routine part of building data centers and application architectures.

The post Making the Case for Network Segmentation in AWS appeared first on Security Intelligence.

Continue reading Making the Case for Network Segmentation in AWS

Why You Should Do Your Homework Before Investing in Enterprise Blockchains

Organizations looking to invest in enterprise blockchains to unify and secure transactions and data records should do their homework before trusting a vendor with their most sensitive information.

The post Why You Should Do Your Homework Before Investing in Enterprise Blockchains appeared first on Security Intelligence.

Continue reading Why You Should Do Your Homework Before Investing in Enterprise Blockchains

Current Trends in Identity and Access Management: July 2017

At the midpoint of 2017, five trends are emerging in the identity and access management, and with these waves comes an opportunity for security teams.

The post Current Trends in Identity and Access Management: July 2017 appeared first on Security Intelligence.

Continue reading Current Trends in Identity and Access Management: July 2017

Creating a Culture of Security Through Change Management

Effective change management requires thorough planning, constant communication, and strong leadership capable of swaying the organizational culture.

The post Creating a Culture of Security Through Change Management appeared first on Security Intelligence.

Continue reading Creating a Culture of Security Through Change Management

Security Is an Organizational Behavior Problem

Security is often viewed as a technology problem, but many vulnerabilities can be traced back to flaws and inconsistencies in organizational behavior.

The post Security Is an Organizational Behavior Problem appeared first on Security Intelligence.

Continue reading Security Is an Organizational Behavior Problem

How Can You Quantify the Value of Automated Provisioning and Deprovisioning?

IT managers can justify security spending by emphasizing the value of provisioning and deprovisioning to improve the user experience and security policies.

The post How Can You Quantify the Value of Automated Provisioning and Deprovisioning? appeared first on Security Intelligence.

Continue reading How Can You Quantify the Value of Automated Provisioning and Deprovisioning?

How Can You Quantify the Value of Web Access Enforcement?

Each business is responsible for establishing its own system for evaluating web access enforcement based on the particular needs of the organization.

The post How Can You Quantify the Value of Web Access Enforcement? appeared first on Security Intelligence.

Continue reading How Can You Quantify the Value of Web Access Enforcement?

Clearing the Fog: Defining the Fundamental IAM Domains

The use of identity and access management is widespread, but the IT industry still lacks a consistent set of definitions for the fundamental IAM domains.

The post Clearing the Fog: Defining the Fundamental IAM Domains appeared first on Security Intelligence.

Continue reading Clearing the Fog: Defining the Fundamental IAM Domains