Tag Archives: endpoint security

Managing Virus Outbreaks with a Trusted Inventory

It was some years ago there was a worm outbreak at a client we had just started managing where we urgently needed to identify every server infected and work on a plan to remove the worm using our own custom … Continue reading

Posted in Cyber Security, Security and Privacy | Tagged , , , , , | Leave a comment

Security without a Trusted Baseline?

Note: This posting is my own and doesn’t necessarily represent IBM’s positions, strategies or opinions. For over a decade I have been involved in deploying security controls across many hundreds of thousands of devices. When deploying any security controls, across … Continue reading

Posted in Security and Privacy | Tagged , , , | Leave a comment