How do you build a successful vulnerability management program? It involves a lot more than just scanning devices. Effective vulnerability management comes from a holistic, systemic approach that involves the entire IT organization.
Good news everybody, Symantec is breaking up. The company will separate their storage and security groups into two distinct companies beginning next year. The full details of Symantec’s break up are here or read Symantec’s site here. The reaction to this news among analysts and customers has been mostly positive. Now, whether this actually improves Symantec or… Read More »
Every week it seems there is a new breach. Why do retailers keep getting breached? Anitian has identified five primary reasons why these breaches are happening. While the hackers are getting more effective, IT security teams are allowing these breaches to happen through poor operations and weak leadership.
What makes a successful IT security leader? Intelligence, experience, integrity? With 20 years of experience working with security people, we have had the fortune to see both highly successful security programs as well as highly dysfunctional ones. The successful teams overwhelmingly have a common set of qualities, which are often common to great leaders in other positions as well.