Month: May 2018
Regular Expressions for Beginners: How to Get Started Discovering Sensitive Data
Any data discovery and classification solution heavily relies on regular expressions (sometimes called RegExes, REs or RegEx patterns) to identify sensitive data. But what are RegExes and how can they be used to discover sensitive data? Let’s find out. Handpicked related content: Data Classification: What It Is, Why You Should Care and How to Perform … Continued
Microsoft File Classification Infrastructure (FCI) Explained
Understanding what data you have and where it is located is a critical step in complying with industry and government regulations, like the European Union’s GDPR directive. Microsoft introduced the File Classification Infrastructure (FCI) in Windows Server 2008 R2 to help organizations classify data stored on Windows file servers. Using FCI, system administrators can set … Continued
PowerShell File Management
Every day, sysadmins perform a variety of standard operations on their Windows servers, including creating, deleting and moving files and folders. By getting fluent with the core set of Active Directory (AD) PowerShell commands provided here, you can dramatically reduce the amount of manual work involved. Handpicked related content: [Free eBook] Windows PowerShell Scripting Tutorial … Continued
CISSP Practice Exam: Free Online Sample Questions
Get Ready for the CISSP Exam with a Free Online Quiz The CISSP is a globally recognized certification granted by the International Information System Security Certification Consortium, also known as (ISC)². This certification has become a prerequisite for many careers in information security. The CISSP covers eight broad domains, so it’s no surprise that preparing … Continued
The 12 Most Common Types of Cyber Security Attacks Today
There are many different types of attacks in cyber security — and network security teams must worry about all of them. While no organization can protect themselves against every type of threat, a company is expected to demonstrate due diligence in protecting against the most common forms of cyber-attacks. The bulk of cyber-attacks are no … Continued
[Infographics] Government’s Rapid Cloud Adoption Lacks Security
The Obama administration’s “Cloud First Initiative” in 2011 gave federal and local agencies the green light to explore cloud services. Both Amazon Web Services and Microsoft Azure immediately provided special offerings targeted at governmental needs, and agencies have been quickly embracing them. According to Fortune, AWS GovCloud has been growing by 221% year over year … Continued
RSA Conference 2018: Top 5 Pieces of Advice for CISOs
As expected, the 27th RSA Conference in April 2018 was one of the major IT security events of the year. 650 exhibitors and 45,000 security professionals came together in San Francisco’s Moscone Center to elaborate on the state of the art and the future of cyber security. Over 500 sessions encompassed a variety of issues, … Continued
Differences Between Share and NTFS Permissions
NTFS and share permissions are both often used in Microsoft Windows environments. While share and NTFS permissions both serve the same purpose — preventing unauthorized access — there are important differences to understand before you determine how to best perform a task like sharing a folder. Here are the key differences between share and NTFS … Continued
Five Reasons to Ditch Manual Data Classification Methods
What is data classification and how hard is it? At first sight, data classification doesn’t look hard. There are four key steps in the process: Entering assets, such as email and electronic documents, in the asset register Classifying each asset according to its sensitivity Labeling the asset based on how it is classified Handling the … Continued