Type to SearchView Tags
Industries | Hi-Tech

Blog Category Listing

“Trust but Verify” is Obsolete: Zero Trust Networking
145

Jan 13, 2021

“Trust but Verify” is Obsolete: Zero Trust Networking

Erik Goldoff CISSP CyberSecurity Consultant, Technical Architect

'Trust but Verify’ is obsolete, supplanted by the Zero Trust concept. Chances are, you already have the hardware and the software solutions you need to implement a Zero Trust environment, so the next step is designing and architecting the proper...
Data Loss Prevention
481

Oct 15, 2020

Understanding Data Loss Prevention (DLP) Program Maturity

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed...
Recognize ‘Normal’
478
To paraphrase a well-known cliché, either you have been breached or you will be breached. You might not be able to prevent infiltration by malicious intent, but you can recognize abnormal versus normal and react quickly...
Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing
415

Jul 06, 2020

Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing

Abhishek Shankar SVP, Hi-Tech Industries and GM Enterprise Studio

Speed and agility are paramount when facing a crisis. But as Aesop’s hare knows all too well, it’s not all about speed—it’s the combination of speed and agility that wins the race. Companies that rely on speed only, without the benefit of agility,...
business needs to start conducting business
127
One of the pioneers in leadership, Peter Drucker, said, “The greatest danger in times of turbulence is not the turbulence; it is to act with yesterday’s logic.” The disruption caused by the worldwide pandemic presents a situation that demands...
Spike in Internet Traffic
356

May 14, 2020

COVID-19 Spike in Internet Traffic Impacts API Performance

John Cocke Principal Transformation Consultant

According to Akamai, 83% of the internet traffic on its secure network is external-facing API traffic. APIs, the connective tissue between people, between people and businesses, and between applications and databases, underpin user experiences that...
Accelerating successful
1,312
Businesses across the spectrum are expected to experience disruptions of some degree due to the COVID-19 impact. Changes at fundamental levels, as well as radical overhauls in existing structures and processes, are already in place to ensure...
Hospital Strengthens Systems
414

May 05, 2020

Hospital Strengthens Systems and Processes During Crisis

Lisa Sass Senior Principal Product Marketing Manager

How one hospital was able to quickly make technology changes during the pandemic response that enabled secure remote work, automated provisioning of IT, medical devices and accessories, and streamlined access to applications the hospital depends on...
cloud
452
Teams developing web- or cloud-based solutions have gone through a huge transformation, starting from the early web developments, then moving into cloud services and cloud applications and now doing full-fledged cloud-based computing. The teams that...
cloud
452
Teams developing web- or cloud-based solutions have gone through a huge transformation, starting from the early web developments, then moving into cloud services and cloud applications and now doing full-fledged cloud-based computing. The teams that...
Five Goals
1,636
https://community.broadcom.com/blogSecurity professionals like you have gone to significant extremes to keep your IAM operations running like a Tesla in ludicrous mode, but we also know there’s always room for improvement. You can take it to the...
Agile Initial Thoughts
1,289

Oct 22, 2019

SAFe 5.0 is Here: Our Initial Thoughts

Sue Laurent Principal Product Marketing Manager

The 2019 Global SAFe Summit in San Diego earlier this month, the members of the Digital Advisory and Consulting Services (DACS) team at Enterprise Studio by HCL Technologies want to share our initial thoughts on the release of SAFe 5.0. Read more...
Data Mining
851

Apr 08, 2019

Role of IoT and Data Mining in the Tech Industry

Saravana Nallakamu SAP Digital CX Practice Lead

The Internet of Things (IoT) is the network connecting the world of tangibles to that of the intangibles, that is, a network of physical objects connected to the software cloud. With the increasing popularity of IoT, new solutions are designed using...
LSH
2,948
Predictive analytics has the potential to enhance value-based care for patients while also driving down costs for payers and providers. As value-based care becomes the norm, next gen enterprises need to leverage predictive analytics to improve...
Data Loss Prevention
481

Oct 15, 2020

Understanding Data Loss Prevention (DLP) Program Maturity

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed...
Digital Customer
548
The advent of smartphones, smart appliances, artificial intelligence (AI), and machine learning (ML)-enabled cars has caused a shift in the way customers experience services. With the role of technology in the lives of customers increasing every day...
Force Multipliers
1,284
Internet of Things (IoT) Security: Key Challenges & their Force Multipliers
Applied AI
334

Nov 19, 2019

Applied AI – Time to lead from the front

Ahmed Mithani Associate Vice President

Applied artificial intelligence (AI) applications are more pervasive across sectors, the time has come for industry leaders to consider the implications of artificial intelligence (AI) applications on both top and bottom lines of businesses. This...

“Trust but Verify” is Obsolete: Zero Trust Networking
Erik Goldoff - CISSP CyberSecurity Consultant, Technical Architect | January 13, 2021
145 Views

'Trust but Verify’ is obsolete, supplanted by the Zero Trust concept. Chances are, you already have the hardware and the software solutions you need to implement a Zero Trust environment, so the next step is designing and architecting the proper configuration.

Using a common organization structure to examine the effects of Zero Trust, topics covered include operating safely in the current threat environment, coordinating Zero Trust efforts, network access configuration, and incremental implementation suggestions. Goring further, topics also include considerations for narrowing the choice of domain users and domain computers, reducing the attack surface for data center resources, configuring OS firewalls to improve security, and policy changes.

Pick up practical technical insights on Zero Trust for reducing the attack surface and improving security posture. Learn when to go it alone in shifting to Zero Trust, and when to call in assistance, and considerations for design, architecture, and implementation.

If your enterprise is breached or compromised, you’ll quickly learn that “There’s no such thing as bad publicity” is a falsehood. Investigate applying Zero Trust to secure your environment.


Understanding Data Loss Prevention (DLP) Program Maturity
Aaron Smith - Information Protection Practice Lead; Director, Symantec Global Consulting | October 15, 2020
481 Views

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed. Many IT and Security teams have hit the crest of the first big wave of change and are taking a moment to look to the horizon and consider ways to improve their architectural and process resilience for the next wave of change.

By necessity, a large part of preparing for that next wave must be self-assessments of internal processes and programs that govern security products in the organizational environment and form our understanding of how those security products interrelate and adapt.

This series focuses on specifically and practically addressing DLP program maturity assessment processes and procedures, from beginning to end. We aim to arm our fellow security practitioners with the real practical tools and advice from people who know and use them daily so that they can use this knowledge to assess this complex and often misunderstood security program.

First up, core foundational elements of a DLP program self-assessment - the central categorical pillars of maturity that we will define, investigate, measure, and report on throughout this series. Our goal is to develop a unified lexicon for communicating about and measuring success, maturity, processes, and objectives for DLP programs.


Recognize ‘Normal’ to Detect ‘Abnormal’: The value of proactive baselining to protect from a data breach
Erik Goldoff - CISSP CyberSecurity Consultant, Technical Architect | July 15, 2020
478 Views

To paraphrase a well-known cliché, either you have been breached or you will be breached. You might not be able to prevent infiltration by malicious intent, but you can recognize abnormal versus normal and react quickly enough to implement your action plan. For those without a plan for a breach, these recommendations are a starting point; for those with a plan, it’s an excellent double-check.