Become a fan of Slashdot on Facebook


Forgot your password?

Submission + - Manage Security Where the Data Resides - Server / File Integrity Monitoring->

MichaelBall writes: "With today's move to virtualization, convergence of Data Center and Cloud Services, and a greater ability for Business Units to outsource/offshore development and hosting of critical applications, the line between Inside and Outside of your perimeter is vanishing.

Additional threats facing us daily include un-patched and legacy systems, zero-day malware attacks, advanced persistent threats, malicious insider breaches, as well as administrator human error.

According to the 2012 Verizon Data Breach Investigations Report , and contrary to popular belief, 94% of all data compromised involved servers.

This article discusses the need to move (or augment) your security controls at the server:"

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Manage Security Where the Data Resides - Server / File Integrity Monitoring

Comments Filter:

In case of injury notify your superior immediately. He'll kiss it and make it better.