Syslog – The Blue-collar Worker of the Data Center
Striking a balance between good visibility into infrastructure events and too much noise is difficult. I’ve worked in plenty of enterprise environments where multiple tools are deployed (often covering the…
I Beat Them to Firing Me! Part Two: Fight Back
How to use network configuration, change, and compliance management (NCCCM) and other monitoring software in response to an actual security breach. If you have not read part one, I would suggest that…
I Beat Them to Firing Me: A Story of Corporate Sabotage
Why network configuration, change, and compliance management (NCCCM) is a must Inspired by former Citibank employee sentencing We’ve all heard horror stories about the disgruntled employee who pillages the office supply…
Non-IT File Sharing and HIPAA Implications
December 6, 2017
Security
When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I…