Discovering Hidden Vulnerabilities

Posted by & filed under Security, The Brite Insight.

Sun Tzu, a Chinese military general, once said, “Know your enemy and know yourself and you can fight a hundred battles without disaster.” In the world of cyber security, there are millions upon millions of battles against well-trained, eager hackers. And while wrapping your head around the gravity of that situation may seem like a… Read more »

Creating a Security-Focused Culture

Posted by & filed under Security, The Brite Insight.

Security is something we live every day. It’s what we do and it’s who we are. Understandably, security may not be your business, your expertise or your passion. But whether you’re a bank, hospital or a retail company it’s important to work towards building a strong security culture. It won’t happen overnight, and it’ll take… Read more »

CIO vs CSO

Posted by & filed under Managed Services, The Brite Insight.

In our last blog, we talked about what is next in advanced authentication. We explored digital wallets, smartphones and one-time passwords. These are all innovative technologies that add an important layer of security to verification process. And although the logic behind implementing an advanced authentication technique seems obvious, it isn’t always easy to get it… Read more »

The Difference Between Just-In-Time Action and A Missed Opportunity

Posted by & filed under Managed Services, The Brite Insight.

In the world of business, visibility delivers relevant insight, which can be the difference between just-in-time action and a missed opportunity. Many security and network administrators are facing up to an underlying shift in enterprise traffic: a growing portion of it is encrypted within SSL. According to an independent study done by NSS Labs, anywhere… Read more »

Controlling Your Data

Posted by & filed under Managed Services, Security, The Brite Insight.

IT organizations struggle to answer fundamental questions about their data centers like “What assets do I have, and how are they connected?” and “Where are they located, and how are they being used?” Manual data collection methods cannot keep pace with today’s complex and dynamic IT environments. The result? Unreliable data and too much guesswork… Read more »

Rising Threats of CryptoWall 2.0

Posted by & filed under Security, The Brite Insight.

We live in a world of odd similarities. One day before Apple launched an even thinner iPad and an even faster computer, hackers were launching the latest version of CryptoWall. Yes, even hackers have product upgrades. It’s called CryptoWall 2.0 that includes numerous improvements by the malware developer. Network administrators beware; CryptoWall 2.0 is strong… Read more »

Growing Threats of Bring Your Own Devices

Posted by & filed under BYOD, The Brite Insight.

Bring Your Own Devices (BYOD) concerns are growing as employees are using their personal devices in the workplace.  Previously, it was uncommon for someone to use a non-office appointed device, but now, according to a recent Ovum survey, nearly 70% of employees use personal devices in the workplace, while one third of this group are… Read more »