logo

Easy Event Log Querying with PowerShell

If you’re using any kind of native Active Directory (AD) auditing today you probably love the information it generates in the security event log. Native AD auditing is awesome about generating loads of useful information as to what happened and when. The problem arises when you actually want to read that information and figure out … Continued

Hacker Team Hacked: A Strong Case for Stronger Passwords

It’s unfortunate when anyone is the victim of a hack or data compromise, but put the moniker ‘hacker’ or ‘security expert’ in your name and you’re sure to identify yourself as a target. Italy’s Hacking Team was such a target. One of the first security “laws” that you learn from security courses is that strong … Continued

Visibility into Virtual Environment: Focus on VMware Server Security

Virtualization is something that has been gaining popularity among IT Pros in past several years, and not without reason. Multiple operation systems and applications can be run on a single server thus saving costs and resources. But virtual machines, not unlike any other part of IT infrastructure, are exposed to intrusions – external as well as … Continued