tag >> hytrust
October 6th, 2017
Automated security policy-enforcement platforms offer the best path to cloud adoption while maintaining protection, accessibility and usability.
October 4th, 2016
This deluge of images and posts on social media brings us to a critical point. Security in general, including infosec, starts at the physical layer. Below is an illustration of the Seven Layers of the OSI Model, note Physical is the base here as well. Sadly many, if not most, illustrations of the OSI Model neglect two of the more important layers, Budgetary and Political, but that is a story for another time.
October 3rd, 2016
Cybersecurity in government is no longer an afterthought. Security officers are helping to strategically design their networks and systems to comply with cyber demands from the moment they begin considering acquiring a new solution. The entire government cybersecurity community, including industry, academia, executives, and agencies themselves, have committed to work together to counter threats intelligently.
- Akamai, Anomali, CyberArk, CyberSponse, FireEye, HPE, HyTrust, NIST, Recorded Future, Resilient Systems, Splunk, Symantec, Tripwire, Vormetric
May 25th, 2016
Virtualization and cloud have both really taken off, with both seeing wide-ranging adoption across enterprises and other organizations, including the public sector. That said, the introduction of the hypervisor into the data center has brought with it considerable change and the need to adapt basic security and operational approaches to this new reality. As you roll out that shiny new SDDC, here are some things to keep in mind.
May 17th, 2016
This month’s focus in Carahsoft’s Innovation in Government series, in collaboration with Government Computer News, focuses on “Securing the Enterprise.” Security has been difficult for enterprises of all kinds, both public and private, to deal with because it is a journey, not a destination. The thought leaders included in this month’s feature can offer you a lot of technical knowledge and advice to make the journey easier.
- Adobe, F5, F5 Networks, Government Cybersecurity, HyTrust, Innovation in Government, Qlik, Red Hat, Splunk, VMware
January 4th, 2016
The world of security in general, InfoSec in particular, is a funny one. For example, in the real world (as opposed to cyberspace) we spend a lot of time worried about all sorts of stranger danger when the reality is that ¾ of child kidnappings are committed by family members and 79% of murders are committed by friends, family, or acquaintances. It seems pretty clear that if something bad is going to happen to you that it is likely that you know the person who is going to do it.
October 28th, 2015
As we wind down cyber security awareness month, we wanted to leave you with some actionable tips for improving the security of increasingly virtualized networks and da
October 12th, 2015
When thinking about a hacker, most people imagine a person sitting in a shadow-filled basement, working furiously on their computer to crack network security codes. Generally, what people are not thinking of is the coworker sitting right next to them. Insider hacking – whether malicious or unintentional – can cause even more harm than external hackers because of their knowledge of the organization’s network resources and the opportunity to access them. In fact, insider attacks were the most costly breaches of 2015.