article thumbnail

Five steps to password policy compliance

IT Security Guru

Brandon has been in the industry 20+ years, is a prolific blogger focusing on networking, virtualization, storage, security & cloud, and contributes to the community through various blog posts and technical documentation primarily at Virtualizationhowto.com.

article thumbnail

Measure Security Performance, Not Policy Compliance

The Falcon's View

Except, of course, that in the real world nobody ever took time to read the more detailed documents, Ops and Dev teams really didn't like being told how to do their jobs, and, at the end of the day, I was frequently reminded that publishing a policy document didn't translate to implementation. Now, note a couple things here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat

Security Boulevard

Thats the message from Europols new document Quantum Safe Financial Forum - A call to action which urges the European financial sector to prioritize adopting post-quantum cryptography. However, the financial sector wont be able to go through this journey unassisted.

Banking 64
article thumbnail

How to Create & Implement a Cloud Security Policy

eSecurity Planet

A cloud security policy is a comprehensive document that describes the organization’s guidelines for protecting cloud services. To ensure comprehensive policy creation, follow the step-by-step approach below with sample document texts for each stage. Determine the policy’s objective and scope.

Risk 71
article thumbnail

11 Key Steps of the Patch Management Process

eSecurity Planet

Also read: Patch Management Policy: Steps, Benefits and a Free Template Step 5: Create documentation before and after patching Keep detailed documentation throughout the patch management process. Document the condition of systems prior to patching, including versions, settings, and vulnerabilities.

article thumbnail

10 Reasons to Celebrate 2020

McAfee

With the McAfee Web Security portfolio, organizations can enforce their internet policy compliance and extend their perimeter security for a borderless IT environment.” We believe this customer recognition validates our commitment to innovate and invest in technology that aims to reduce the cost and complexity of modern cybersecurity.

article thumbnail

Patch Management Policy: Steps, Benefits and a Free Template

eSecurity Planet

Review and Modify the Patch Management Policy. Even though the first formal Patch Management Policy may be approved by step three, keep in mind that all policies should be living documents that need to change as the organization changes. Overview : sets expectations and goals for the policy.