Cyber Chief Magazine: Top trends shaping management priorities in 2020 Download Now
20 April, 2016 | Alex Vovk

4 Rules to Enhance Email Security in the Cloud

The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent...
11 November, 2013 | Nick Cavalancia

Best Practices for Change Management in the Data Center

When it comes to change management, Scott Matteson gets it.  Too many companies today make changes without any kind of change management in place. Scott's approach even includes the mandated use of individual accounts to perform changes so that Auditing of system changes can easily be tied back to...
7 November, 2013 | Nick Cavalancia

Death by Event Log Overload

When it comes to security, event logs are supposed to be the best friends of an IT guy managing the environment, right? Roger Grimes from InfoWorld claims that the evidence of malicious activity can be found in Event Logs. So, if companies today already have all necessary data that points...
15 August, 2011 | Stephen Schimmel

NetWrix Change Reporter Suite: Two New Components Added

Download Free Trial NetWrix has recently added two new components to the Change Reporter Suite: Non-Owner Mailbox Access Reporter for Exchange and Logon Reporter. New additions to NetWrix’s integrated solution for streamlined security and compliance mean that in addition to the IT...
12 September, 2010 | Stephen Schimmel

Key Strategies for Simplified Exchange 2010 Auditing

For a moment, think of how you would feel about a stranger rifling through your house, opening up bills and examining your personal life? If not for obvious footprints left behind within the confined area, would you even know that a break-in occurred? Now consider the value of your exchange...