It is time to enhance our security approach. I firmly believe this is not a problem of technology but of the security posture of a company and the attitude towards defending critical assets – in this case, money – with in-depth defense.

There are a number of technologies that, working together, can be effective and efficient in protecting against attacks. What is very much needed is a plan, a process and a systemic approach to security that considers the different phases of detection, identification, protection, eradication and recovery.

If we properly align the technologies we use in terms of privileged account management, next-generation firewall, log and event management, endpoint security and so on, and use the insights from correlating information from them all, we would have a comprehensive set of technologies working towards protecting and defending sensitive information.

Read More

comments (0)

Leave a reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>