- Well, I suggest we conduct it. Until the end of the study, both you and the director are suspended from work.
A week has passed.
— Gentlemen, I regret to admit that Georges was right. The Trojan was indeed on the director’s smartphone. Most likely, it was obtained while working via public Wi-Fi in the airport cafe. But this is, of course, already in the realm of speculation. I wonder if we have any other managers who violate the rules for using smartphones? What do you think, Georges?
- Of course. And not just one. Everyone referred to the director, saying, he can, but why am I worse?
- team again. If they refuse to provide their smartphone for setup, do not provide the corresponding rights.
- But on what basis? After all, they are much higher in rank than me.
- That's right. From this day on, you report directly to the board of directors. Work!
The benefits of having employees always connected are clear. However, it poses a significant challenge for enterprise security managers, who must always be sure that constant access to corporate data from anywhere does not pose a risk to the company itself. According to the latest iPass Mobile Security Report, 92% of them said they were morocco mobile database about the security issues associated with the increasing mobility of employees.
From SIEM to SOC - from simple to complex
Valery Vasiliev | 06/22/2017
IncreaseKsenia Zasetskaya
Ksenia Zasetskaya
IncreaseEvgeniy Afonin
Evgeniy Afonin
The average time to detect a corporate ICT infrastructure breach, according to estimates voiced by Evgeny Afonin, an architect of information security solutions at HPE, is 243 days today. At the same time, a medium-sized company registers approximately 8-12 thousand information security events every second. These data were obtained based on users of the ArcSight SIEM tool; most likely, similar information security and information security event management (SIEM) tools detect the same number of events.
To adequately respond to changes in the cyber threat landscape characterized by such indicators, it is necessary to automate and centralize the collection, correlation, and preferably even analysis (using developed rules) of information security events. SIEM systems have been used for these purposes for about twenty years.
You must conduct training for the management
-
- Posts: 535
- Joined: Mon Dec 23, 2024 3:13 am