Incorporate Application Security Checks and Balances Into Your Organization’s Citizen Developer Initiatives

Citizen developer programs can reduce costs and boost efficiency, but they require heightened vigilance when it comes to application security.

The post Incorporate Application Security Checks and Balances Into Your Organization’s Citizen Developer Initiatives appeared first on Security Intelligence.

Continue reading Incorporate Application Security Checks and Balances Into Your Organization’s Citizen Developer Initiatives

DHS cyber tool finds huge amount of ‘shadow IT’ in U.S. agencies

New cybersecurity tools being deployed across the U.S. government found huge numbers of uncatalogued and unmanaged computer devices connected to federal networks — a phenomenon known as “shadow IT” — that necessitated urgent modifications to many hundreds of millions of dollars’ worth of contracts. Some departments and agencies had “several hundred percent” more devices on their networks than they expected and the average across government was about 44 percent more, Department of Homeland Security official Kevin Cox said last week at the McAfee Security Through Innovation Summit, hosted by CyberScoop. “There was something of a ‘oh shit’ moment,” said a person familiar with the discovery, made during the recent rollout of phase one of Continuous Diagnostics and Monitoring tools. CDM is a DHS-funded, government-wide acquisition program that buys and installs cybersecurity tools on U.S. departmental and agency networks. The tools found every kind of device imaginable on federal networks, this person said, from […]

The post DHS cyber tool finds huge amount of ‘shadow IT’ in U.S. agencies appeared first on Cyberscoop.

Continue reading DHS cyber tool finds huge amount of ‘shadow IT’ in U.S. agencies

Enable self-healing endpoint security with Application Persistence

In this podcast recorded at RSA Conference 2017, Richard Henderson, Global Security Strategist at Absolute Software, and Todd Wakerley, SVP of Product Development at Absolute Software, talk about Application Persistence. Here’s a transcript of the podcast for your convenience. Richard Henderson: Hi! I’m Richard Henderson, Global Security Strategist at Absolute Software. Todd Wakerley: And I’m Todd Wakerley. I’m the SVP of Product Development at Absolute Software. And today we’re here to talk about Absolute Persistence … More Continue reading Enable self-healing endpoint security with Application Persistence

Security practices need to evolve in order to handle complex threats

There is no one-size-fits-all security solution to address the threat landscape today’s businesses face. Each organization has unique security obstacles and obligations. Billions of dollars have been invested into IT security solutions and increasing annual security budgets has been an imperative. In fact, 98% of business respondents reported they will spend over a million dollars in 2017, per a global study by the Ponemon Institute. However, many of the systems and people in place are … More Continue reading Security practices need to evolve in order to handle complex threats

The CIO Must Take Charge of the Organization’s Application Portfolio

With more businesses turning to SaaS and cloud-based systems, CIOs often lack a proper understanding of the organization’s application portfolio.

The post The CIO Must Take Charge of the Organization’s Application Portfolio appeared first on Security Intelligence.

Continue reading The CIO Must Take Charge of the Organization’s Application Portfolio