ANX Corporate Blog

Posts filed under Uncategorized

Showing 11 through 15 of 47 total posts

Posted September 06, 2011 7:42 pm by Steven Fox

Cultural Security: Promoting Security Policies Using Organizational Culture

Cross promoted from the McAfee Security Connected blog


Most of us refer to security policies in much the same way as we refer to our car manuals – when something unexpected happens.  We know these documents have useful information.  However, their utility is tied to situations where answers do not present themselves readily.

According to Chris Noel, SVP of Product Management at ANXeBusiness, “security policies communicate organizational culture, set expectations and boundaries, define risk appetites, and establish a legal duty of care.”  Unfortunately, a role-based, functional understanding of security policies is uncommon. So how do we take security policies out of the proverbial glove compartment?  The following tips are based on “Eight Ways to Communicate Your Strategy...

Read more

Comments (0) Comment Bubble

Southfield, Mich. and Santa Clara, Calif.—August 30, 2011—ANX, a leading provider of managed security, compliance and connectivity solutions, and OpSource, Inc., the leader in enterprise cloud and managed hosting, today joined forces to help enterprises extend cloud-based resources more securely and efficiently. OpSource clients can deploy cloud-based solutions with ANX Secure Cloud Access, a managed service for user-to-cloud connections that completely secures all endpoints, eliminating access security concerns often associated with cloud computing. As part of the partnership, ANX becomes a Validated Cloud Solution provider.

Industry analysts widely expect the market for cloud computing services to grow exponentially, with some analysts forecasting annual revenues of...

Read more

Comments (0) Comment Bubble

Posted August 18, 2011 8:39 pm by Steven Fox

DefCon 19 - Weaponizing Cyberpsychology

Company X, a transportation company in the Midwest, had a well-managed external network infrastructure.  The few vulnerabilities that existed led to low-impact information breach that did not compromise corporate or customer information.  Satisfied with the status of their network security, I turned my attention to the human network.

Searching for the client name on sites like Twitter, Facebook, and LinkedIn, I discovered employee names and corporate activities that were not shared on its website.  As the search continued, the client's culture, processes, and lexicon emerged from the corporate dialogue. 

This information enabled me to persuade employees to give me access to critical information and secured areas. This included usernames, passwords, and access to...

Read more

Comments (0) Comment Bubble

Posted August 16, 2011 6:10 pm by Julie Pham

ANX Profiles Franchise Security Breach in Live Webcast

Enterprise Security Consulting Manager John Roskoph Walks Through a Franchise Security Breach Scenario and Discusses Causes, Consequences, and Safeguards to Protect Your Franchise Against a Possible Breach

Southfield, MI August 17, 2011 – ANXeBusiness Corp. (ANX), a leading provider of managed security, compliance and connectivity solutions, today announced that it will host a live webcast on August 24, 2011, entitled “Profile of a Franchise Security Breach.” The Webcast will feature John Roskoph, enterprise security consulting manager at ANX.

In the complex distributed environment of franchises, sensitive customer data is processed, transmitted, or stored across a diverse range of sites, including POS locations, offices, warehouses, distribution centers, or web channels,...

Read more

Comments (0) Comment Bubble

Posted August 15, 2011 10:54 am by Steven Fox

DefCon 19 ReCap - Security When Nanoseconds Count

High-speed trading - it's a reality often lost in the discussions of current financial challenges.  Much of the trading activity that drives the global economy occurs at speeds that exceed human capability.  Yes - computers conduct trades at nanosecond speeds based on mathematical algorithms.  These algorithms take into account information from global markets, futures trading, financial indicators, among other factors to make trading decisions.  Speed is money for these systems. Any devices that increases network latency - such as a firewall - means lost profits.

Security When Nanoseconds Count was a presentation at DefCon 19 where James Arlen discussed security in an environment where firewalls, access control lists, and system hardening are impractical given their negative...

Read more

Comments (0) Comment Bubble