The Undocumented Layers of the OSI Model and Their Impact on Security

The biggest threat to data security doesn’t come from hackers, misconfigured firewalls, missing patches, or negligent employees. Nor is it in the application layer of the Open Systems Interconnection (OSI) Basic Model. Instead, there are three undocumented layers of the OSI Model that exert a huge influence on security decisions and the integrity of security programs. Learn about those layers and how to manage the threat.

Featured Software Research:

Cloud/SaaS is the Perfect Solution for Food and Beverage Processors

Fast becoming the preferred delivery model for companies in other manufacturing industries, software as a service (SaaS) is being adopted by food and beverage processing companies using inadequate management systems. See how a SaaS-based enterprise resource planning (ERP) system helps processors operate more efficiently and profitably, and enables world-class security, disaster recovery, and an expandable storage capacity. Read More

Keeping Score: Evolving Wholesale Credit on a Maturity Model

  • Source: IBM
  • Written By:
  • Published:
The inner workings of a global financial institution can contain literally hundreds of systems in which credit risk is recorded. This risk may be managed with dozens of different, disparate systems, which can appear to be an overwhelming and resource-intensive process. This is where a maturity model comes into play. A maturity model scorecard provides banks with a single point of reference to understand what they are, where they wish to go, some practical ideas about where to start, and how to do it most cost-effectively. Read More

Quick Take: Pulse Secure Spins Off, Immediately Acquires MobileSpaces

After network infrastructure provider Juniper Networks sold secure gateway Junos Pulse, this led to the creation of Pulse Secure. The security provider immediately acquired mobile application security company Mobile Spaces. What does this mean for security and risk management companies and professionals interested in strengthening mobile security within their business? This report from Forrester Research looks at the acquisition and its implications. Read More

You may also be interested in these related documents:

Understanding the PCI Data Security Standard

The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a proactive rather than passive way. These include security management, policies, procedures, network architectures, software design, and other protective measures. Get a better understanding of the PCC DSS and learn the costs and benefits of compliance. Read More

An Introduction to Load Balancing

Is it possible for a business to ensure uninterrupted, secure, and high-performance access to network-based business applications and web sites? Yes. With network load balancers, user requests are evenly distributed among available servers so that individual servers do not become overwhelmed. Learn about the basics of load balancing and how it can improve the performance and security of your business applications. Read More

Database Activity Monitoring: Intrusion Detection and Security Auditing

At its core, security is all about risk reduction. One of the most effective database security practices, “defense in depth,” employs multiple layers of protection to reduce the risk of intrusion. No single level of defense is infallible, and even multiple layers cannot ensure your organization will be 100 percent impenetrable. However, they can make you far less vulnerable. Read More
 
comments powered by Disqus