Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - Manage Security Where the Data Resides - Server / File Integrity Monitoring->

Submitted by
MichaelBall
MichaelBall writes "With today's move to virtualization, convergence of Data Center and Cloud Services, and a greater ability for Business Units to outsource/offshore development and hosting of critical applications, the line between Inside and Outside of your perimeter is vanishing.

Additional threats facing us daily include un-patched and legacy systems, zero-day malware attacks, advanced persistent threats, malicious insider breaches, as well as administrator human error.

According to the 2012 Verizon Data Breach Investigations Report , and contrary to popular belief, 94% of all data compromised involved servers.

This article discusses the need to move (or augment) your security controls at the server:"

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Manage Security Where the Data Resides - Server / File Integrity Monitoring

Comments Filter:

I have hardly ever known a mathematician who was capable of reasoning. -- Plato

Working...