With Software Defined Networking (SDN) being the new industry buzzword, more and more people including network architects, CIOs and CTOs have started exploring SDN and...
Bridge the gap between IT Operations & IT Security
Traditionally, IT operations and IT Security have remained at loggerheads. IT operations team is tasked with the responsibility of carrying out the the day-to-day activities,...
Object access auditing simplified: Find the who, what, when, and where of file and folder accesses
For many administrators face knowing what actually happened to their files and folders can be a challenge–who accessed them, deleted them, edited them, moved them,...
Privileged User Monitoring and Audit (PUMA)
Privileged Users, like Network Administrators, System Administrators, and Database Administrators all have unrestricted access to all the critical servers, applications, and databases in an enterprise....
The Perils of Non-Compliance
The word ‘compliance’ has come a long way in the English dictionary. It might have started as yet another addition to the vocabulary, but now...
Why IT Matters
When I was in business school in the late 1990’s, we learned about Total-Factor Productivity (TFP). That’s the factor or coefficient that, when combined with...
IT’s New Reality
Jason Hiner over at TechRepublic wrote a blog the other day entitled What the IT department will look like in 2015. He’s got some interesting...
A Tale of Two Realities: IT Managers, What’s Keeping You from Adopting New Technologies?
I had a lot of fun talking to Michael Dortch recently. For those of you who don’t know Michael, he’s a charismatic IT analyst who...
Lessons from Sony PSN breach
The breach at Sony Play Station Network (PSN) breach creates a lot of doubts in the IT Security manager’s mind. We can take our lessons...