Not too long ago, we talked about Convergence as IT supporting the security department as devices come onto the IT network.
Now, the security department's devices and software may pose a major threat to corporate cyber security, if not selected and deployed properly.
This article by Rob O'Regan from The Art of the Attack was posted the other day. Topics like this get closer and closer to home. Take a read for yourself.
- Threats are outpacing enterprise defenses more...
- Attacks are becoming more targeted more...
- Too many enterprises still lack a sense of urgency about threats more...
Below are additional resources to help you keep your security devices from causing an IT and corporate nightmare.
We've summarized the information and many of the resources to help you stay on top of this topic:
- IP Video and Data Security Guidebook
- Secure the Edge of the Network - White Paper
- 3 Common Security Hacks
- Data Security Leaflet
- Securing Data and Equipment Racks
- Encryption of Intrusion Detection Systems
- Security of Security
- Security Encryption and Certificates FAQ
- PKI CHAVE One-Page
- PKI CHAVE Leaflet
- PKI CHAVE Presentation PPT
- Lessons learned from major health care data breaches
- NIST Cybersecurity IT Asset Management Practice Guide
- Contact our team for expert security advice