Cyber Chief Magazine: Top trends shaping management priorities in 2020 Download Now
13 November, 2014 | Richard Muniz

How to Steal a Virtual Machine in Three Easy Steps

This last week, a thread in Spiceworks discussed a rogue sys admin that had come back to haunt this company. I read through the different threads and one in particular jumped out at me: “You people sound like a bunch of cops. Don’t you trust anyone? In order to trust someone, you must be...
30 October, 2014 | Jeff Melnick

Can SIEM Solutions Be Effectively Used for Change Auditing?

This should be no revelation to IT professionals: you have to regularly monitor changes occurring in your network – and mainly for two reasons. The first one is this: continuous monitoring will take pain off meeting compliance requirements and surviving auditor’s visits. The second reason to...
14 August, 2014 | Brian Svidergol

Avoid Data Breaches: Top Five Tips

It is hard to keep up with all of the various computer security incidents occurring daily. One can't help but wonder if more incidents are being reported and spreading through social media and internet news or if more incidents are taking place. It is likely both. The good news is, over the last...