Access "Five considerations for securing a midmarket company"
This article is part of the March 2009 issue of Top considerations for midmarket security
Get creative. That's the most important step for anyone in charge of securing a midsize business, says Tony Meholic. He should know. Meholic went from managing the ethical hacking team at JP Morgan Chase, a huge worldwide enterprise, to leading security at Republic First Bank, a 300-employee regional bank based in Philadelphia. At JP Morgan, buying a $100,000 tool was a simple matter of some paperwork and signatures. At Republic First, asking for a $25,000 tool got him a pat on the back and a vague promise of "maybe sometime." "You have to get more creative as far as maintaining security, because certainly the requirements don't change," Meholic says. Just like their large counterparts, midsize companies with 100 to 1,000 employees face regulatory compliance pressures. They also face the same kinds of threats and can't afford a reputation-destroying and costly data security breach. But unlike big enterprises, midsize businesses don't have the luxury of ample resources and large security teams. They rely on ingenuity to figure out ways to secure their data ... Access >>>
Premium Content for Free.
Five considerations for securing a midmarket company
Smaller organizations need to be more resourceful, and we'll explain how risk management, automation and managed security services, among others, can help.
Choosing the right Web application firewall
by Michael Cobb, Application Security
PCI DSS is requiring companies to buy Web application firewalls. We'll show how you how to pick the WAF that's right for you, and how to use it so your company is compliant -- and more secure.
Cloud computing security framework may ease security concerns
The Jericho Forum is expected to release a framework of security considerations for organizations moving business to the cloud.
- Five considerations for securing a midmarket company
How to Secure Cloud Computing
On-demand computing services can save large enterprises and small businesses a lot of money, but security and regulatory compliance become difficult.
How to secure use of Web 2.0
How much information is too much information, and how will you monitor and manage the use of Web 2.0 inside your organization?
- How to Secure Cloud Computing
Cybersecurity's profile rising under Obama
The Obama Administration is conducting a review of the government's cybersecurity policies and process. We should be encouraged that security could move beyond the useless paper exercise it is today
Enforcing a vendor risk assessment to avoid outsourcing security risks
by David Mortman, Contributor
As enterprises outsource more services and share data, they must be vigilant about the security of third parties.
Data classification best practices: Techniques, methods and projects
by Jay Heiser, Contributor
Effective data classification in the enterprise requires a simple approach.
- Cybersecurity's profile rising under Obama
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...