Ask the Security Expert with Charles Kolodgy


October 17, 2014

Submit your questions to: [email protected]

This week we have a question from Anthony of Seattle, Washington.

Q: As a result of the highly publicized data breaches, it seems like executive at companies leadership are taking greater interest in IT security yet it also seems that achieving a strong security posture is harder than ever.  Why is that?


October 7, 2014

Submit your questions to: [email protected]

This week we have a question from Susan of Troy, Michigan.

Q: There are so many new technologies out there that say they are the panacea. What steps can I take to ensure that we are implementing solutions that address our actual needs, rather pursuing technology for technology's sake?


September 24, 2014

Submit your questions to: [email protected]

This week we have a question from David of Dayton, Ohio.

Q: Most organizations seem to address incident response management by purchasing a variety of point solutions that actually generate more "symptoms" than relief. Do you think incident management is more about a process or a suite of technologies?

 

September 18, 2014

Submit your questions to: [email protected]

This week we have a question from Kyle of Pasadena, California.

Q: We have a distributed enterprise. Why do think central management of our security is important for us?

A: The most important reason for central management of security and networking within a distributed enterprise is cost savings. If your organization has 1,000 sites, you can't afford to have one person at each site responsible for managing security policy. 


September 10, 2014

Submit your questions to: [email protected]

This week we have a question from Joanne of New Mexico.

Q: We are constantly under assault.  What is the primary goal of attackers?

A: Attacks are complex and sophisticated, limited only by the ingenuity and inventiveness of attackers. There are specific classes of attacks including brute force attacks that push their way past defenses, attacks that exploit vulnerabilities, and ones that use custom malware.   


July 11, 2014

Submit your questions to: [email protected]

This week we have a question from Dennis Richard from San Jose. 

Q:  How can I manage policies across multiple firewalls from different vendors, in different countries, with different audit requirements?

A:  The quick answer for managing disparate firewalls is to purchase a product that is built for complex environments.  

AlgoSec, Firemon, ManageEngine, Solarwinds, and Tufin Technologies all have products that can provide centralized firewall management across multiple environments.  


May 13, 2014

Submit your questions to: [email protected]

This week we have a question from Ms. S Walsh of Minneapolis:

Q:  My organization has the typical set of security solutions and I have no additional budget.  However with the recent high profile vulnerabilities, I’m concerned that I’m missing something, especially to defend against zero day threats.  If I can do only one thing to improve my company’s security posture, what should it be?

A:  It is generally difficult to pick out the one thing that can reduce risk, because security is about creating layers.  We can’t rely on one component only.  However that said, there is one thing I believe should be a starting point which many enterprises overlook – don’t allow users to have administrative rights on enterprise computers.  


October 23, 2013

By Charles Kolodgy

How do you defend against something that's never been seen before?  That's the key question organizations struggle with.  A decade ago, the first victims of any worm or virus outbreak had difficulty defending against a brand-new threat, leaving resources vulnerable until the attack could be detected and signatures created.  Today the ultimate problem is the same, but the level of difficulty is considerably higher.  Attacks used to be massive and indiscriminant, trying to catch anyone that had the vulnerability exploited by the malware.  Once the new attack was discovered, one set of defenses could be deployed to neutralize the threat.  Organizations that were not exploited would receive updated signatures to allow their perimeter and endpoint defenses to thwart the threat.

The Human Factor: Gain new insight into the ways attackers exploit end-users' psychology​​

About Security Current | Privacy Policy | Subscribe to our newsletter