Month: February 2014
What’s Getting Lost in Your Log Data?
When stories come up in the news about data breaches, if you’re like me, you tend to gloss over them if they seem similar to something you’ve already read. I almost did that today. But something in this story really got my attention. There’s a story this week about Neiman Marcus being hit by hackers who … Continued
Preparing for the Outside Auditor with Regular Monitoring
Does your business get audited by outside agencies? If you handle sensitive data, such as customer credit card numbers or patient health information, there’s a good chance you do. And the approach of auditors probably fills most IT professionals with a certain amount of dread. Queue Blue Öyster Cult’s “(Don’t Fear) The Reaper.” TechTarget’s SearchSecurity … Continued