IT Security

Visit:

Chrome’s removing the “Secure” label from HTTPS sites—but why? 

Gone are the days when the green “Secure” label stood to distinguish legitimate websites from potentially malicious ones. Shortly after marking all HTTP sites with a “Not Secure” badge earlier this year, Google has now stepped up to remove …

Key Manager Plus 2 min read

Simplifying security auditing, Part 3: Keeping insider threats in check 

Insider threats are on the rise. In fact, both administrators and average employees are among the biggest security threats in an organization. When it comes to security auditing, there are two areas you need to focus on: Active Directory …

IT Security 2 min read

Simplifying security auditing, Part 1: Regularly reviewing server activity 

Everyone knows about the importance of log management in IT security. Yet, organizations struggle with implementing effective log management techniques in their networks. This blog series aims to revisit the fundamentals of log management and discuss the different security events …

IT Security 2 min read

Network breach at Australian National University serves as a reminder about the Notifiable Data Breaches scheme 

Earlier this month, several news outlets reported that Australian National University’s (ANU) network was breached, allegedly by Chinese hackers. Although the official statement from ANU said that the threat was averted and no data was compromised, the breach serves as …

IT Security 2 min read

How to leverage SIEM to meet the GDPR’s requirements

Today’s businesses run on data. From getting customer information for payment, processing employee information for payroll, using publicly available data for targeted advertising, to tracking people’s behavior for marketing, data has become the power center of organizations. But with this …

IT Security 3 min read

Cyberattacks are coming—is your firewall ready?

In HBO’s hit series Game of Thrones, the Seven Kingdoms had the Wall to keep out White Walkers, and for many generations, it did exactly that. But even the strongest fortifications can fall flat if improperly managed; like the Wall …

firewallanalyzer 3 min read

Learn how to audit and secure your SQL and IIS servers

Virtually every business today depends on databases and web servers for daily operations. Since these business-critical applications deal with sensitive data, keeping them secure is a major priority—as a security professional, you need to carefully evaluate and implement security measures …

IT Security 1 min read

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

What should you consider when choosing a SIEM tool.

In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and show you what to consider …

EventLogAnalyzer 3 min read

Adopting a SIEM solution, Part 1: Why choose SIEM?

Security threats are on the rise and hackers’ attack methods are becoming more sophisticated each day.

According to the recent Verizon Data Breach Report, “Sixty-eight percent of breaches took months or longer to discover, even though eighty-seven percent of the

IT Security 2 min read

Is global expansion crippling your hold on network security?

Globalization and foreign investments have completely changed the way enterprises are run today. Enterprises are expanding geographically to diversify their risk portfolio, but this expansion hasn’t been linear. From mergers to buyouts, today’s enterprises have endless possibilities, which translates into …

firewallanalyzer 2 min read