New 8-bit Game! Help the sysadmin get to his boss and win prizes Play Now
Sarah Greesonbach
Cyber Security & Compliance
28 March, 2016

Plan Effective SIEM First, Compliance Second

Security information and event management (SIEM) is a major priority for large companies. It’s a reporting process that provides a holistic view of the health of an organization’s IT security as...
IT Audit & Management
9 November, 2015

4 Business Cases to Support Privileged Identity Management

Privileged Identity Management (PIM) is often dismissed as an exclusively tech priority; after all, making it easier to monitor and support changes within an IT environment has a direct effect on its...
Cyber Security & Compliance
2 November, 2015

GLBA Compliance to Secure Consumer Data

The Gramm-Leach-Bliley Act (GLBA) was enacted to protect consumer financial information from mistakes within companies that industry process, transfer, and store massive amounts of consumer data....
Cyber Security & Compliance
26 October, 2015

2 October Medical Data Breaches That Could Have Been Prevented

The IT industry fights to reduce and eliminate its overall risk for security breaches year in and year out. That’s why it’s so disheartening to read about recent breaches in the news. It always...
Show more articles