Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
21 February, 2019 | Jeff Melnick

Why Native Network Device Auditing Is Not Enough

In one of my previous blog posts, I shared the top issues that network device auditing can help you solve. Among them are controlling device configuration, detecting unauthorized actions and thwarting scanning threats. In short, I argue that to keep your network infrastructure secure and ensure...
29 January, 2019 | Jeff Melnick

Why Monitoring of Network Devices Is Critical for Network Security

A secure network infrastructure is critical for organizations, and that requires keeping close track of what’s going on with routers, switches and other network devices. You need to be able to quickly detect and investigate threats to your perimeter security, such as unauthorized changes to...
15 January, 2019 | Jeff Melnick

Top 10 Best Network Monitoring Tools

If you don’t know the state of your network every second of the day, you're like a blind pilot inevitably headed for disaster. Fortunately, the market now offers many good software solutions, both commercial and open source, for network monitoring. Handpicked related content: [Free...
6 June, 2014 | Brian Keith Winstead

Network Auditing vs NSA Surveillance

Last December, Microsoft published an article on its official blog detailing steps the company planned to take to protect its customers’ data from government snooping. Written by Brad Smith, general counsel and executive vice president for Microsoft Legal & Corporate Affairs, the article...
20 February, 2014 | Brian Keith Winstead

Preparing for the Outside Auditor with Regular Monitoring

Does your business get audited by outside agencies? If you handle sensitive data, such as customer credit card numbers or patient health information, there’s a good chance you do. And the approach of auditors probably fills most IT professionals with a certain amount of dread. Queue Blue Öyster...
Show more articles