Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
16 May, 2016 | Russell Smith

4 Steps to a Secure Active Directory Administration Model

Active Directory (AD) is a primary target for hackers as it provides a way to get access sensitive company data. Here are four considerations for establishing a secure administration model for Active Directory. 1. Remove excess domain administrator privileges Domain and enterprise administrator...
28 March, 2016 | Sarah Greesonbach

Plan Effective SIEM First, Compliance Second

Security information and event management (SIEM) is a major priority for large companies. It’s a reporting process that provides a holistic view of the health of an organization’s IT security as well as important details for various kinds of compliance regulations, including GLBA, PCI, FISMA,...
21 March, 2016 | Alex Vovk

How to Overcome SIEM Limitations

SIEM has a reputation as a helpful and must-have solution to improve security for any enterprise. However, Forrester experts say that SIEM has certain limitations, which makes it inefficient without additional investments in technology and personnel. Key SIEM Limitations SIEM has limitation...
14 December, 2015 | Jeff Melnick

Top 7 IT Security Threats for 2016

While the number of announced data breaches in 2015 is lower compared to 2014, the number of compromised accounts increased dramatically, exposing more personal data than ever before. Among the top causes is an increase in hidden attacks that use more advanced technics to bypass security...
26 October, 2015 | Sarah Greesonbach

2 October Medical Data Breaches That Could Have Been Prevented

The IT industry fights to reduce and eliminate its overall risk for security breaches year in and year out. That’s why it’s so disheartening to read about recent breaches in the news. It always comes down to one concerning question: Could that have been me? The most productive thing we can...
Show more articles