Things often turn out great when you do them yourself. But when it comes to signing SSL certificates, you might want to give that DIY project a second thought. Before...
Taking stock of your security posture after the Equifax cyber breach
Equifax, a leading credit bureau, was victim to a massive cyber breach a few months ago. Given that the attack was one of the largest...
Begin your GDPR journey with privileged access management
The core of the GDPR is all about data protection; specifically, securing EU citizens’ personal data. However, the GDPR does not explicitly state how to achieve this level...
Getting to know the GDPR: The technical and organizational measures
Before we jump into the third part of this GDPR blog series, let’s take a moment to think about a few questions. Such as, why are compliance mandates necessary? Are they framed to just prevent data breaches? Are...
Log management and SIEM fundamentals: Searching through logs and responding to incidents
Understanding what happened in a security incident and trying to analyze the root cause of an attack is like looking for a needle in a haystack....
Log management and SIEM fundamentals: Mitigating security threats
In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a thorough audit of your network. Now that we’ve got the basics...
Protecting against Petya and other ransomware
As a security professional, which do you fear more: 1) explaining to your boss or CEO that your enterprise’s files are no longer accessible because...
Log management and SIEM fundamentals: Comprehensive log collection and auditing
The first step in SIEM is collecting log data. Log data, as we saw in part 1, is what drives any SIEM solution. A SIEM...