New Partnership enables organizations to prioritize their remediation by identifying the most critical vulnerabilities in their environment
Columbus, OH November 26, 2013 – Risk I/O, a software-as-a-service platform that correlates external Internet breach and exploit data with vulnerability data to monitor, measure, and prioritize vulnerability remediation, has partnered with Strategic IT Security Solution company Jacadis to promote its vulnerability correlation, analysis, and prioritization application.
Jacadis will be introducing to their clients the range of risk and vulnerability intelligence solutions in Risk I/O’s portfolio, including real-time analysis of global attack and breach data, alongside security vulnerabilities, to help businesses identify where they are most likely to be attacked. The platform prioritizes vulnerabilities and provides customizable Risk Meters, allowing organizations [...]
New partnership enables organizations to create comprehensive IT GRC programs leveraging TraceCSO, a single cloud-based software solution
Columbus, OH – November 12, 2013 – Jacadis, a strategic information security solution company, today announced a partnership with TraceSecurity, the pioneer in cloud-based IT governance, risk and compliance (GRC) solutions, to promote its flagship software solution, TraceCSO. Under terms of the agreement, Jacadis customers can now implement and manage on-going, risk-based information security programs that allow them to automate their audit and compliance management and reporting.
Jacadis will introduce its clients to a range of GRC management solutions from TraceSecurity, including TraceCSO. TraceCSO allows organizations of any size, industry or security skill level to evaluate, create, implement and manage a holistic, risk-based IT security strategy. The [...]
New Partnership offers Enterprises Real-time Security Management and Risk Analysis Solutions to Automate Network Security and Reduce Operations Costs
Columbus, OH- October11, 2013 – FireMon, the leading provider of security management and risk analysis solutions, has appointed Strategic IT Security Solution company Jacadis to promote its risk analysis and policy and configuration management solutions. The appointment forms part of the security vendor’s channel strategy of establishing a network of resellers and Managed Service Providers with the requisite level of skills and expertise to add value and offer complementary focus in terms of different vertical markets and geographies.
Jacadis will be introducing to their clients the range of security solutions in FireMon’s network security portfolio, including the recently released FireMon Security Manager 7.0, that greatly improves an IT security [...]
If you’ve ever worked in an operational role, especially on the network team or on the security team, then you know how painful it can be to answer that question.
When I was managing an infosec team back in my retail days, there was nothing I “loved” more than that 3:00 AM phone call from the folks in the command center (one of the most underappreciated teams in IT), who needed me to assist in resolving a production-impacting incident.
Over time, I learned that there were a few things I could do reduce the number of 3:00 AM calls while increasing the amount of sleep I was able to get AND improving the availability of our network.
- Fully document your environment. How many systems are connected to your network? What apps run on those systems? Who are the business owners? Developing a complete understanding of your environment is critical if you intend to stabilize those systems (i.e., ensure their availability) through patch management and secure [...]
How to Find - and Fix First - Network Vulnerabilities Most Likely to Get Attacked
If you run a large network, figuring out what to fix first when vulnerabilities arise is crucial to minimizing your security and compliance risks. This never-ending, high-pressure task determines whether your IT resources are closing the right holes, or getting side-tracked by threats that could be handled later or mitigated in other ways.
Join Jacadis and FireMon to learn how vulnerability scans and network security configuration information can be combined automatically to identify which problems you should tackle first. This risk-centric approach to finding and fixing vulnerabilities delivers greater security and compliance with less effort and expense.
Jacadis and FireMon experts will be on hand to answer questions and discuss your specific security environment.
The Distributed Denial of Service (DDoS) attack against Spamhaus, an anti-spam group, has been dubbed the largest DDoS attack to date. According to The New York Times, the impact of the attack extends beyond Spamhaus, affecting other sites and services that rely on the same infrastructure (like Netflix).
But did you know about the DDoS attack on Wells Fargo? Key Bank? TD Bank? PNC? JPMC? Capital One? SendGrid? Free Malaysia Radio? Krebs on Security? All of these sites have recently been victims of DDoS attacks, a list that unfortunately continues to grow.
Simply put, a Denial of Service (DoS) attack overwhelms a system or application by throwing more data at the target than the target can [...]
iPad and iPhone users are no strangers to .mobileconfig files. These are the files that contain customized iDevice configurations unique to your organization. Administrators can create these XML files with the iPhone Configuration Utility, and then send the files to users via email or a download link. When a user installs the .mobileconfig file on their device, the device settings (e.g., passcode, VPN, are automatically updated to match the predetermined configuration.
Pretty cool feature, but what happens when Google indexes .mobileconfig files that it discovers on Internet-facing websites?
The end result is that the wifi password that you thought you had hidden within that .mobileconfig file is now publicly available.
The field HIDDEN_NETWORK Password isn’t quite as hidden as it’s supposed to be. To see what .mobileconfig files have [...]
Last Thursday, HHS published its Final Rule, conclusively settling the conversation about its numerous interim and proposed rules developed in light of the American Recovery and Reinvestment Act of 2009. Our inbox received a
Final Omnibus Rule Comprised of Final Versions of Four Proposed or Interim Final Rules
The four rules that combine to create the omnibus final [...]
If you’ve been following the news surrounding the latest Java 0-Day vulnerability, then you’re aware that it is already being exploited. You may also be aware that US-CERT has made an official recommendation that everyone disable Java in their web browsers until this vulnerability has been fixed.
The simplest way to disable Java in all your web browsers at once is as follows:
- 1. Open the Java Control Panel
- In Windows (7), go to Start > Control Panel
- In Mac OS X (10.7.3 and above), go to System Preerences > Control Panel
- 2. Change View by: to Large icons, and then click [...]
Change seems constant in information technology and information security.
Eleven years ago we started Jacadis to focus on two key services. We hardened servers for companies investing in web technologies and we assessed the security of our client’s internet connections against the best practices of the time.
As technology and security challenges change we’ve had to constantly reengineer ourselves.
Moving forward into our second decade, Jacadis is an information risk management solution provider with expanded services and a broadened catalog of safeguards and controls.
Threats to your data never go away. Neither should your security partner.
And we have built a services menu to ensure that is true.
We can help you Assess and Measure your security programs, Build and Deploy secure infrastructure, Manage and Defend critical assets or help you Respond and Recover [...]
- Risk I/O Partners with Jacadis Strategic IT Security Solutions Posted by Jacadis - 11/26/13
- Jacadis and TraceSecurity Partner to Simplify IT GRC Management Posted by Jacadis - 11/13/13
- FireMon Appoints Jacadis as Value Added Reseller for its Security Posture Management Solution Posted by Jacadis - 10/11/13
- What happened on your network last night? Posted by Jerod Brennen - 10/10/13
- Jacadis and FireMon Lunch and Learn Event Posted by Jacadis - 10/09/13