Latest In

information security

Managing the Madness: BYOD Network Devices
June 15, 2018
Kevin Blackburn
When it comes to technology, device management resources have come a long way, just as much as the technology in our actual devices has. As a network or systems admin,…
Who Protects the Protectors?
June 14, 2018
Leon Adato
Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to…
Microsoft Workstation Logs – Configuration
February 22, 2018
Natalie Timms
Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in…
Non-IT File Sharing and HIPAA Implications
December 6, 2017
Brandon Carroll
When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I…
123