Self-signed certificates: Wolves in sheeps’ clothing

Things often turn out great when you do them yourself. But when it comes to signing SSL certificates, you might want to give that DIY project a second thought. Before...

Key Manager Plus 3 min read Read

Taking stock of your security posture after the Equifax cyber breach

Equifax, a leading credit bureau, was victim to a massive cyber breach a few months ago. Given that the attack was one of the largest...

IT Security 3 min read Read

Begin your GDPR journey with privileged access management

The core of the GDPR is all about data protection; specifically, securing EU citizens’ personal data. However, the GDPR does not explicitly state how to achieve this level...

Password Manager Pro 3 min read Read

Getting to know the GDPR: The technical and organizational measures

Before we jump into the third part of this GDPR blog series, let’s take a moment to think about a few questions. Such as, why are compliance mandates necessary? Are they framed to just prevent data breaches? Are...

EventLogAnalyzer 2 min read Read

The GDPR: Requirements pertaining to data collection

Welcome to part two in a four part blog series about the European Union’s GDPR. In our previous blog, we discussed highlights and FAQ on the GDPR. Now, let’s...

IT Security 2 min read Read

Log management and SIEM fundamentals: Searching through logs and responding to incidents

Understanding what happened in a security incident and trying to analyze the root cause of an attack is like looking for a needle in a haystack....

IT Security 3 min read Read

Log management and SIEM fundamentals: Mitigating security threats 

In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a thorough audit of your network. Now that we’ve got the basics...

IT Security 3 min read Read

Protecting against Petya and other ransomware

As a security professional, which do you fear more: 1) explaining to your boss or CEO that your enterprise’s files are no longer accessible because...

IT Security 2 min read Read

Log management and SIEM fundamentals: Comprehensive log collection and auditing

The first step in SIEM is collecting log data. Log data, as we saw in part 1, is what drives any SIEM solution. A SIEM...

IT Security 3 min read Read