security

Tag: security

Log Analysis Tools Review: Syslog, Filtering the Most Relevant Events

Who’s passed more than a weekend going almost blind because something in your didn’t work as it should, and it produced, hopefully, thousands of lines of error messages, almost all…

Bringing Ease of Use and Security to Remote Users

The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from…

Syslog – The Blue-collar Worker of the Data Center

Striking a balance between good visibility into infrastructure events and too much noise is difficult. I’ve worked in plenty of enterprise environments where multiple tools are deployed (often covering the…

Cloud Native Operational Solutions – Malware Prevention Management

Malware prevention is a very hot topic due to the recent ransomware attacks that have completely crippled several companies and organizations. For most smaller companies, being able to hire a…

5 Strategies for Security and Operations Success

Hybrid IT presents SecOps challenges   The Department of Defense (DoD) has long been at the tip of the spear when it comes to successfully melding IT security and operations…

I Beat Them to Firing Me! Part Two: Fight Back

How to use network configuration, change, and compliance management (NCCCM) and other monitoring software in response to an actual security breach. If you have not read part one, I would suggest that…

I Beat Them to Firing Me: A Story of Corporate Sabotage

Why network configuration, change, and compliance management (NCCCM) is a must Inspired by former Citibank employee sentencing We’ve all heard horror stories about the disgruntled employee who pillages the office supply…

Windows Workstation Logs – Increasing Visibility

Anyone who has looked at the number of event IDs assigned to Windows events has probably felt overwhelmed. In the last blog, we looked at some best practices events that…

Microsoft Workstation Logs – Focus on What’s Important

Can you have too much of a good thing? Maybe not, but you can certainly have too much of the wrong thing. In my first blog, I introduced the idea…

Non-IT File Sharing and HIPAA Implications

When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I…