http://www.healthordisease.com

General

Home|General

Dynamic whitelisting and security policy automation.

Many Cybersecurity experts have said for years that we need to do better whitelisting, and that relying on blacklisting and anomaly detection is not good enough anymore. Unfortunately, organizations often cannot technically implement the comprehensive security policies they want to (or should want to). This is because there are too many overlapping technical configs [...]

By |August 14th, 2017|

What is Security Policy Automation?

Today’s information age would have felt like out of a sci-fi movie to someone 20 years ago. More data has been created in the past two years than in the entire previous history of the human race. 1.7MB of data is created for every human per second. Within 4 years, we will have generated [...]

By |March 30th, 2017|

OpenPMF v4.0 Launch Events

ObjectSecurity is proud to release OpenPMF 4.0, a major new product version in mid-February 2017. ObjectSecurity invites you to the OpenPMF 4.0 launch events during RSA Expo week (Feb 13 & 14, 2017) and to our virtual online launch event. ObjectSecurity invites you to the OpenPMF 4.0 launch events, which will be held at Elan Event Venue [...]

By |January 22nd, 2017|

The Need for Better Cybersecurity Prioritization Metrics

Most organizations are overwhelmed, understaffed, and/or underfunded when it comes to cybersecurity. These constraints create a critical need to prioritize on the most critical cybersecurity measures. However, often these priorities are unclear or hard to determine, leading to less-than-optimal cybersecurity product purchases and/or activities. This is because the metrics about which overarching cybersecurity priorities matter [...]

By |January 10th, 2017|

Hackers Attack Every 39 Seconds

A Clark School study at the University of Maryland is one of the first to quantify the near-constant rate of hacker attacks of computers with Internet access. Source: Securitymagazine.com The study, conducted by Michel Cukier, Clark School assistant professor of mechanical engineering and affiliate of the Clark School's Center for Risk and Reliability and [...]

By |January 7th, 2017|

OpenPMF 4.0 Explainer & Demo Videos

In this video, ObjectSecurity founder & CEO Dr. Ulrich Lang explains and showcases the major new release 4.0 of our OpenPMF product.  OpenPMF™ makes security policy manageable through automation. It gives you powerful security policy implementation that is also effortless to manage. It allows you to improve protection, monitoring, testing, and documenting – for your information, [...]

By |December 14th, 2016|

What is Attribute Based Access Control (ABAC)?

Attribute based access control (ABAC) is a different approach to access control in which access rights are granted through the use of policies made up of attributes working together. ABAC uses attributes as the building blocks to define feature-rich access control rules and access requests. An example standard to do ABAC is the eXtensible Access Control Markup Language (XACML). [...]

By |November 25th, 2016|

grosvenor pools how to built your pool

If you want to build a pool in your home, in this article Grosvenor Pools will tell you everything you need to know to build a pool at the best price. Building a pool in the home brings many benefits: it improves relationships in the family, serves to exercise, helps with the heat in summer [...]

By |July 19th, 2010|
http://nosubhealth.com