What’s Getting Lost in Your Log Data?

When stories come up in the news about data breaches, if you’re like me, you tend to gloss over them if they seem similar to something you’ve already read.  I almost did that today.  But something in this story really got my attention. There’s a story this week about Neiman Marcus being hit by hackers who … Continued

Preparing for the Outside Auditor with Regular Monitoring

Does your business get audited by outside agencies? If you handle sensitive data, such as customer credit card numbers or patient health information, there’s a good chance you do. And the approach of auditors probably fills most IT professionals with a certain amount of dread. Queue Blue Öyster Cult’s “(Don’t Fear) The Reaper.” TechTarget’s SearchSecurity … Continued

Take the Survey: 2014 State of IT Changes

Participate in Netwrix’s “2014 State of IT Changes” survey and be entered to win one of five $50 Amazon gift cards. This simple 12 question survey focuses on how you and your organization look at changes to your IT infrastructure, whether you use change management, and the impact of changes made. Take 5 minutes, tell … Continued

Live Webinar on Active Directory Auditing

Date: Thursday, February 20, 2014 Time: 2:00 PM EST Active Directory Auditing Headaches (and How to Solve Them) Keeping tabs on changes to Active Directory can be a challenge for even the most experienced IT administrator. From auditing privileged user activity, tracking privileged group access, to monitoring changes to the structure of your AD forest, staying on … Continued