March 18, 2020 | Ryan Brooks

How to Manage Redundant, Obsolete and Trivial Data

When a network contains an excess of redundant, obsolete and trivial (ROT) data, productivity and desired outcomes can take a hit. The good news is that organizations can significantly reduce the impact of ROT data when they plan properly and invest in the right tools. Handpicked related...
February 27, 2020 | Alex Vovk

How to Overcome SIEM Limitations

SIEM has a reputation as a helpful and must-have solution to improve security for any enterprise. However, Forrester experts say that SIEM has certain limitations, which makes it inefficient without additional investments in technology and personnel. Key SIEM Limitations SIEM has limitation...
April 5, 2019 | Brian Svidergol

Avoid Data Breaches: Top Five Tips

It is hard to keep up with all of the various computer security incidents occurring daily. One can't help but wonder if more incidents are being reported and spreading through social media and internet news or if more incidents are taking place. It is likely both. The good news is, over the last...
March 27, 2019 | Sarah Greesonbach

Understanding and Achieving PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) establishes compliance regulations that affect businesses accepting credit, debit, or prepaid cards as payment online, by telephone, or by individual terminals. Because so many businesses use credit, debit, and prepaid cards as a core...
March 27, 2019 | Jeff Melnick

Top 7 IT Security Threats for 2016

While the number of announced data breaches in 2015 is lower compared to 2014, the number of compromised accounts increased dramatically, exposing more personal data than ever before. Among the top causes is an increase in hidden attacks that use more advanced technics to bypass security...
March 27, 2019 | Sarah Greesonbach

Plan Effective SIEM First, Compliance Second

Security information and event management (SIEM) is a major priority for large companies. It’s a reporting process that provides a holistic view of the health of an organization’s IT security as well as important details for various kinds of compliance regulations, including GLBA, PCI, FISMA,...
March 27, 2019 | Russell Smith

4 Steps to a Secure Active Directory Administration Model

Active Directory (AD) is a primary target for hackers as it provides a way to get access sensitive company data. Here are four considerations for establishing a secure administration model for Active Directory. 1. Remove excess domain administrator privileges Domain and enterprise administrator...
...