Latest In

information security

You Are Here – Making Sense of Modern InfoSec
October 12, 2018
Chris Grundemann
Now that we all carry supercomputers complete with real-time GPS mapping in our pockets, a reference to physical maps may feel a bit antiquated. You know the ones I’m talking…
Security Monitoring – It’s All About the Data
September 11, 2018
Natalie Timms
In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential.…
Data Protection: Culture, Tools, People, and Roles
September 6, 2018
Karen Lopez
In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture.  In this post, I’ll be going over the data protection…
The Hidden Costs of Backup Software
August 31, 2018
James Green
The focus of data protection has changed. Backups and data recovery used to exist primarily to protect against human error or natural disaster. The focus was on recovering from an…
Culture of Data Protection: What Your Customers Expect
August 23, 2018
Karen Lopez
We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering.  Today, we’ll be considering the culture of protection the…
Policy and Controls – A Foundation for Threat Protection
August 14, 2018
Natalie Timms
In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…
Security Pain Points: Upper Management and Budget
July 26, 2018
Destiny Bertucci
Security should be a top priority for IT professionals within all areas of skills. One of the top pain points is how to convey the story of security to upper…
Building a Culture for Data Protection
July 12, 2018
Karen Lopez
Building a culture that favors protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data…
Log Analysis Tools Review: Syslog, Filtering the Most Relevant Events
June 15, 2018
Raff Poltronieri
Who’s passed more than a weekend going almost blind because something in your didn’t work as it should, and it produced, hopefully, thousands of lines of error messages, almost all…
Bringing Ease of Use and Security to Remote Users
June 15, 2018
Kevin Blackburn
The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from…