Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
What's the story with these ads on Slashdot? Check out our new blog post to find out. ×
Security

Submission + - Manage Security Where the Data Resides - Server / File Integrity Monitoring->

MichaelBall writes: "With today's move to virtualization, convergence of Data Center and Cloud Services, and a greater ability for Business Units to outsource/offshore development and hosting of critical applications, the line between Inside and Outside of your perimeter is vanishing.

Additional threats facing us daily include un-patched and legacy systems, zero-day malware attacks, advanced persistent threats, malicious insider breaches, as well as administrator human error.

According to the 2012 Verizon Data Breach Investigations Report , and contrary to popular belief, 94% of all data compromised involved servers.

This article discusses the need to move (or augment) your security controls at the server:"

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Manage Security Where the Data Resides - Server / File Integrity Monitoring

Comments Filter:

My sister opened a computer store in Hawaii. She sells C shells down by the seashore.

Working...