buy lipitor online
Hurwitz & Associates - Insight is Action

Hurwitz & Associates Blog

As thought leaders in the IT industry, Hurwitz blogs are a wealth of knowledge and insight into trending technologies.

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Login
    Login Login form
Data integration from multiple security point-products is a real problem for many enterprise customers. There are too many threat intelligence feeds – and no easy way to view all incoming data in a contextual way that facilitates interpretation, analysis, and remediation. Therefore, knocking down your organization’s in-house security software silos may become an essential element to improving your cybersecurity profile. Cybersecurity relies on tools to identify an increasing number of threats. However, the proliferation of security point products slows down the ability of organizations to identify threats and respond. For many customers, there is too much input, from too many sources –...
Last modified on
Hits: 878
0
Continue reading 0 Comments

How Can You Drive #PositiveSecurity?

Posted by on in Security
Balance Risk and Costs for Positive Security
I’m a big car nut so I wondered if there are any parallels between the evolution of cars and IT security. Seven years after the first automobile was produced by Karl Benz in 1886, electronic security started when the wireless telegraph, the first network was hacked. While both technologies were have born in similar eras, their paths quickly diverged. Automobiles evolved at a fast pace over the years because consumers and government demanded improvements. Performance increased, costs decreased, and safety got a lot better. In contrast, security’s progression was largely motivated by the risk - prevention from attacks, detection of current attacks,...
Last modified on
Hits: 894
0
Continue reading 0 Comments

Rethinking the Approach to Fraud

Posted by on in Security
If you think fraud is not your issue, think again; 1 in 13 people will be impacted by fraud. Therefore businesses that hope to maintain the trust of their customers must be able to address fraud in a consistent and predictable way.  If executed well, corporations, government, and non-profits companies need to protect their constituents by being both accountable and prepared. To achieve this aim requires more than simply implementing a set of point solutions, employing individual subject matter expertise, and reviewing an IT governance playbook.  My colleague, Dan Kirsch and I recently attended an IBM meeting where they announced their...
Last modified on
Hits: 11428
0
Continue reading 0 Comments

The Emergence of Big Data Security Intelligence

Posted by on in Security
What's Driving Big Data Security Intelligence? There is a new generation of security offerings that can anticipate threats and prevent them in real-time.  This new generation of offerings is emerging because of an increase level of risk.  Traditionally, security systems have worked by collecting and analyzing logs and then setting alerts to trigger action when activity falls outside of a specified pattern.  This approach  no longer satisfies the security needs of many organizations.  There are an increasing number of  newer threats, such as Advanced Persistent Threats (APTs) that are designed to look like normal system traffic and often do not trigger...
Last modified on
Hits: 4394
0
Continue reading 0 Comments

Is Facebook Responsible... for Security?

Posted by on in Security
A few weeks ago I wrote a guest blog on Harvard Business Review’s Online site. The blog which is linked to below basically explains what happened to me when my Facebook account was hacked.  One day after this article appeared I received the following message from “Barry” at Facebook: After reviewing this report, we determined that the profile you are reporting violates our Statement of Rights and Responsibilities. As a result, we removed this profile from Facebook. Needless to say, I was relieved that I had my identity back. I still wonder what would have happened had I not had the...
Last modified on
Hits: 3399
0
Continue reading 0 Comments

Holes in Endpoint Security

Posted by on in Security
There is an avalanche of devices and end points that employees, customers and partners are beginning to utilize as they conduct even routine business transactions. An end point device might be a PC, smart phone or even a flash drive. The challenges of IT security are complicating the ability of organizations to protect their intellectual property as well as their reputations in the market.  And it isn’t just IT that is concerned. IT security has grabbed the attention of governmental bodies and the boards of directors of many companies.  Clearly, passwords – even when they are frequently changed and made more...
Last modified on
Hits: 3548
0
Continue reading 0 Comments

IBM Rethinks its Security Strategy

Posted by on in Security
IBM is making a major push to try to establish leadership in the broad market for security, compliance, and governance.  The company’s latest foray is significant with the  acquisition of Q1 Labs.   On its own, this is an important acquisition because the company has developed significant intellectual property in security intelligence products in vital areas such as SIEM (Security Information and Event Management), risk management, log management, network behavior analytics and security event management.  What is more significant from a customer perspective is the way IBM is going about transforming its approach to the security market.  IBM has taken the step...
Last modified on
Hits: 3980
0
Continue reading 0 Comments
security police
Almost every conversation I have had over the past year or so always comes back to security in the cloud.  Is it really secure? Or we are thinking about implementing the cloud but we are worried about security.  There are, of course, good reasons to plan a cloud security strategy. But in a sense, it is no different than planning a security strategy for your company. But it is the big scary cloud! Well, before I list the top then issues I would like to say one thing: if you think you need an entirely different security strategy for the cloud,...
Last modified on
Hits: 2748
0
Continue reading 7 Comments