Skip to main content

Home/ Consitio_20121/ Group items tagged security network

Rss Feed Group items tagged

Juan Vicente Lladró

5 Top Trends Redefining CSO Priorities - Microsoft Security Blog - Site Home - TechNet ... - 1 views

  • 1. Consumerization of IT
  • 95 percent of information workers use self-purchased technology for work
    • Juan Vicente Lladró
       
      Cada vez es más popular las políticas de BYOD, Bring Your Own Device, que acrecientan la fragmentación de la seguridad.
  • 2. Cloud Computing
  • ...10 more annotations...
  • 3. Advanced Persistent Threat
  • an enterprise needs to know that resources placed on the cloud have the proper level of security, yet moving to the cloud limits an organization’s ability to control systems and data.
  • The economic case for cloud computing can be persuasive
  • Unlike the highly visible infections of the past, such as the ILOVEYOU virus, an APT is designed to elude detection, making the job of detection and protection all the more difficult.
  • Cyber threat has changed, and the primary concern is no longer malware that incidentally impacts an organization, but rather the threat of very targeted attacks for purposes of industry espionage, cyber crime or – if a company is part of critical infrastructure – cyber war.
  • 4. Expanding Importance of Identity
  • as perimeters fall away and applications migrate to the Cloud, the value of authenticated identity has even more importance
  • NSTIC is the White House initiative to work collaboratively with the private sector, advocacy groups, public sector agencies, and other organizations to improve the privacy, security, and convenience of sensitive online transactions.  Identity management will continue to a top concern for IT departments for the immediate future.
  • 5. Increased Government Role in Cybersecurity
  • “The architecture of the Nation’s digital infrastructure, based largely upon the Internet, is not secure or resilient. Without major advances in the security of these systems or significant change in how they are constructed or operated, it is doubtful that the United States can protect itself from the growing threat of cybercrime and state-sponsored intrusions and operations.” and “Information and communications networks are largely owned and operated by the private sector, both nationally and internationally. Thus, addressing network security issues requires a public-private partnership as well as international cooperation and norms.”
  •  
    Artículo muy interesante sobre las 5 tendencias que están redefiniendo las prioridades del Chief Security Officer
guillermo cortina

Audience :: Preface :: Network security assessment :: Networking :: eTutorials.org - 1 views

  • This book assumes you are familiar with IP and administering Unix-based operating systems, such as Linux or Solaris. A technical network administrator or security consultant should be comfortable with the contents of each chapter.
    • guillermo cortina
       
      Este libro se orienta a un perfil técnico de alto nivel de seguridad y le guía en la senda de las auditorías de seguridad. Su aspecto por tanto es muy técnico y fuera del ámbito de la gestión.
guillermo cortina

Preface :: Network security assessment :: Networking :: eTutorials.org - 0 views

  • Assessment is the first step any organization should take to start managing information risks correctly
    • guillermo cortina
       
      Evaluar la red para un responsable de seguridad, es el primer paso a tomar para conocer las vulnerabilidades del sistema. Este libro proporciona una guía informativa de las herramientas y técnicas que los enemigos pueden usar.
  •  
    Edicion inglesa del libro en castellano publicado por ANAYA de Chris Mcnab titulado SEGURIDAD DE REDES Técnicas y herramientas para la evaluación de seguridad de redes
itiooscar

Gartner: 7 major trends forcing IT security pros to change - Network World - 0 views

  •  
    Presenta de modo sintético las nuevas formas de interactuar con las TIC y los nuevas arquitecturas TIC y sus riesgos asociados de seguridad. Un artículo muy interesante porque describe los entornos actuales TIC que se están consolidando y los nuevos retos en seguridad TIC que generan.
1 - 5 of 5
Showing 20 items per page