Published Works by Jeff Stein
Automating user lifecycle management is an important topic not only to the security of an organization but also to the overall function of an enterprise. By achieving effectiveness through automation in your user lifecycle management process you will not only increase the productivity of your operational teams through the reduction of work required to manage the user lifecycle, but also add effective security controls to your information security program.
The regularity at which domains are spoofed by malicious senders illustrates the issue and the need for message integrity in email. Where the original SMTP standard is lacking from a security design standpoint, standards are now available to compliment SMTP that provides a more secure messaging experience. Communication can be sent over TLS to provide for encryption and therefore, confidentially of email during transmission. From a message integrity standpoint, a combination of three email authentication standards, SPF, DKIM, and DMARC provides for a secure implementation of email.
Protecting a website requires an undivided focus not only on the web assets and code contained on a site but also the transmission of data traversing the internet itself. The importance of leveraging HTTPS as a part of a comprehensive web security strategy cannot be understated. Not only should HTTPS be considered fundamental in protecting data in transit across the web, but it can also play a very significant part in building customer trust in your website and security posture.
The importance of and need for a well-defined and properly implemented vulnerability management program continues to increase as the technology we utilize and the industry driving it changes. New arenas such as cloud computing and distributed workforces with BYOD policies contribute new challenges in how the enterprise addresses security and vulnerability management. Additionally, the growing demand for security-focused talent raises a business’ expectations for higher performance from security teams, typically with reduced headcounts than in years previous. Thus, maximizing your vulnerability management program greatly benefits your security posture.
Thoughts Scripts Published Works Courses