A useful GSOC is one that understands the problem a company wants to solve so that the data collection requirements and analytics are relevant and staff with the right expertise are in place. If you think that establishing a GSOC is the next step for your enterprise, three key elements will determine its success.
Sumo Logic research reports that 56% of companies with more than 10,000 employees receive more than 1,000 security alerts every day, and 93% say they cannot address all alerts the same day. Cybercriminals are also aware of alert fatigue and count on IT to ignore many security alerts. So, what can you do?
The Broad Institute of MIT and Harvard has served as one of the largest processors of COVID-19 tests in the country. The Security Team has supported these efforts in myriad ways, helping maintain business continuity and ensure campus safety, visitor management, and compliance with COVID-19 safety protocols.
The Broad Institute of MIT and Harvard has served as one of the largest processors of COVID-19 tests in the country. The Security Team has supported these efforts in myriad ways, helping maintain business continuity and ensure campus safety, visitor management, and compliance with COVID-19 safety protocols.
While enterprises around the globe were shutting down and moving to remote work, frontline food suppliers, transport companies and grocery stores didn’t have that ability. AGNE needed to continue to distribute product to independent grocer members as well as its own stores throughout New England and New York, while also dealing with increased freight and procurement demands into the facility.
As a critical business, Associated Grocers of New England needed to continue distribution to independent grocer members as well as its own stores throughout New England and New York, while also managing increased freight and procurement demands into the facility during the beginning of the pandemic. The organization’s Risk Management and Loss Prevention teams stepped up to help.
Security spoke to Kimber Goerres, Security Systems Integration & Project Management Lead at Sony Electronics, who has served diligently in her role, ensuring the company’s error or down rate is nominal and establishing the technical security requirements for Sony offices globally. Here, Goerres speaks about her role, establishing technical security requirements and ensuring improved security levels through risk, vulnerability and audit assessments.
In the past, passwords were the key to accessing systems and platforms, and they held much value as a security measure for businesses. But over time, the threat landscape has evolved, and weaknesses have been discovered in standard encryption methods that have diminished the password’s value.
While many organizations may realize they can’t entirely eliminate cyber risk, they still need to quantify their security efforts and set thresholds to show whether they’re trending positively or introducing more risk. The right metrics help to shed light on a company’s current security posture and, more importantly, where it might have gaps, shortcomings, or areas to prioritize for future improvement.
Software as a service (SaaS) has taken over, and the average enterprise now uses hundreds of unique SaaS applications to accelerate their digital transformation and business velocity. However, while SaaS has fulfilled its growth-enabling potential, most organizations have lost their grip on its consumption and use. IT and security teams can no longer depend on network or endpoint controls to govern application access.
With more than a hundred continuous integration and continuous deployment (CI/CD) tools to choose from and hundreds of plugins and services connected to those tools, no wonder security teams have a hard time grasping the amount of information and security requirements of these environments.