Your Security Operations Center (SOC): Built, Shared or as-a-Service?

Cyber attacks have become ever more frequent, targeted and sophisticated. Millions of warnings are produced by platforms, applications and numerous point solutions like antivirus (AV), intrusion detection system (IDS)/ intrusion prevention system (IPS) and firewalls. Quality and speed of the response are essential to limit the impact on your organization. Unfortunately, the trend is going in the opposite direction. Due to the increased complexity of the attacks, companies are forced to employ more and more resources to detect and eliminate a threat. A professionally designed Security Operations Center (SOC) can be a vital line of defense against unauthorized, malicious activity in real time. This requires employing the right people, technology and processes. But what other aspects have to be taken into account when investing in your SOC? Read More

Cybersecurity: Big Opportunities for Big Data

What has Big Data been up to?

Big Data has been a major topic in the IT realm for years. The terms Big Data and Big Data analytics are generally used to describe the potential for new insights into our environment by making sense of the rapidly increasing amount of information produced by the growing number of connected devices. But what is the bigger picture in the potential of Big Data in cybersecurity?

Read More

10 Things Board Members Should Know and Ask About Cybersecurity

Security is like most business decisions not a democratic decision. You as board member, CEO, COO or CFO define the level of security your company stands for. The challenge is that you speak a different language than your security professionals. They might seem overly paranoid or technical for you and do not understand the realities and priorities you have to deal with on a daily basis. Given the evolving information security threats to any organization, it’s imperative that you set the security standards of your organization. Consider the following 10 principles. Read More

Enterprise Architecture and Agile Development: Two Worlds Colliding or Opposites Attract?

Authors: Marc Lankhorst (BiZZdesign), Danny Weinberger (CSC)

See German Version below.

New Picture (5)

Why Agility Matters

Agility has become a key ability of enterprises. The pace at which customers require changes, at which new laws and regulations affect services and introduce processes, and the ease with which competitors can disrupt your business, as Google and Apple do nowadays, leads to tremendous pressure. Pressure to change rapidly, to adopt new technologies, to generate growth, to scale up or to reduce cost. So in many organizations, being agile is as crucial as being able to innovate. Innovation and agility are necessary competences for a sustainable business. Read More

Smart Home – Still Secure Home?

With the upcoming Internet of Things and Industry 4.0 the Smart Home/Smart Office or more generally the Smart Building is becoming more and more important. Smart Buildings use technology from the traditional home and building control and connect it to the internet. Commercials from the television promise to control the complete home from the smartphone or tablet but never say a word about IT security. When vendors talk about security they mean securing your home with alarm systems but forget to say that all this security may easily be bypassed, if the control systems are not secure by the means of IT security. So, let’s have a closer look at that. Read More

Copyright 2015 21st CENTURY IT · RSS Feed · Anmelden