New ESG Research finds that CISOs use a combination of traditional drivers and new requirements to shape their information security strategy.
Everyone's talking BYOD and MDM but hardly anyone is considering mobile application development's growing impact. This has to change.
As part of the software development process, information security professionals must make choices about where to invest their budget and staff resources to ensure that homegrown applications are as secure as possible. ESG research found organizations that are considered security “leaders” tend to make different choices than other firms. For example, leaders rely on integrated development and testing suites, scan their applications from multiple perspectives to uncover vulnerabilities, and invest in training developers in security concepts and tools. This research brief details these best practices for all organizations that would like to produce more secure applications.
When it comes to information security monitoring, ESG Research indicates that enterprises have pressing needs for integration, intelligence, automation, and big data capabilities.
Frightened by the prospects of APTs, botnets, and Trojans, large organizations are investing in new advanced malware detection/prevention technologies to fortify defense-in-depth. Should these new security technologies be applied to the network or to host systems? Both.
Cybersecurity events like security breaches, APTs, and pending legislation are becoming mainstream as the public recongnizes that our society is inexorably tied together via servers and networks. With all this attention, one fundamental security problem continues to fly "under the radar." The fact is that a lot of the software we depend upon is insecure and extremely vulnerable to attack. Unfortunately this issue isn't getting enough attention and ESG Research indicates that enterprise organizations aren't doing enough to address their own software security deficiencies.
VMware has been ptiching network virtualization and next-generation data centers solely based upon virtualization software. Great vision but in reality, VMware is still used mostly for server consolidation. To take its virtual networking game to the next level, VMware just announced its plans to acquire SDN startup Nicira for an unbelievable $1 billion +. This move shows that VMware is willing to make incredible investments to back its vision but there is a lot of work ahead.
In order to assess the state of information security management and operations in 2012 and beyond, ESG surveyed 315 security professionals working at enterprise-class (1,000 employees or more) organizations in North America. All respondents were personally responsible for or familiar with their organizations’ 2011 information security strategies as well as their 2012 IT security budget and spending plans at either an organizational or business unit/division/branch level.
The Senate Homeland Security and Government Affairs (HSGAC) introduced a new cybersecurity bill last Thursday. According to ESG Research around Advanced Persistent Threats (APTs), security professionals believe it's time to stop debating and pass legislation.
IT security management and operations is evolving rapidly to address new types of threats and support IT initiatives like BYOD, cloud computing, and infrastructure virtualization. A new ESG report examines how security challenges, successes, and strategies affect people, processes, and technologies. ESG used its survey data to categorize large organizations as security management "leaders," "followers," or "laggards." Only 19% of enterprises can be considered "leaders"—the vast majority are extremely unprepared and remain vulnerable to cyber attacks.
Yes, there is plenty of hype surrounding BYOD and mobile device security but new ESG Research identifies a number of real problems facing enterprise organizations. Mobile devices are introducing new risks that must be addressed in a comprehensive manner.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe