Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
16 January, 2019 | Brian Johnson

Top 3 Audit Challenges and How to Overcome Them

No matter what role you play in the audit process, the experience can be painful. If you’re an external consultant, you have to work with clients who have limited budgets and high expectations. And if you’re an internal IT/security auditor, you might have to wade through a sea of internal...
14 June, 2018 | Matt Middleton-Leal

GDPR Confusion: 7 Common Myths Busted

The day before the deadline for GDPR compliance, I received emails from 8 different companies asking for my consent for them to collect data about me. But I can’t even remember how I got on these vendors’ mailing lists, and I haven’t received any other communication from them lately....
24 March, 2015 | Deb Shinder

Data Governance: The Key to Compliance

In a legislation-laden era, more and more organizations are falling under the mandates of governmental or industry regulation. The requirements can be complex and confusing, and it’s hard to know where to start in creating and enforcing policies that will keep your company in compliance, so many...
17 October, 2014 | Jeff Melnick

How to Detect User Account Changes in Active Directory

Tracking user account changes in Active Directory is primarily important from compliance and security-related considerations and also for operational efficiency purposes. Inactive user accounts or a large number of new accounts with extended permissions, disabled or suspiciously modified user...
7 November, 2013 | Nick Cavalancia

Death by Event Log Overload

When it comes to security, event logs are supposed to be the best friends of an IT guy managing the environment, right? Roger Grimes from InfoWorld claims that the evidence of malicious activity can be found in Event Logs. So, if companies today already have all necessary data that points...
Show more articles