Solving a Cyber Crime Case Like Sherlock Holmes

IT security managers lay a lot of emphasis on conducting log forensics investigations. According to the SANS 2013 Digital Forensics Survey, 57% of the respondents...

EventLogAnalyzer 3 min read Read

8 Log Management Habits of Highly Effective IT Security Managers

In today’s business environment, data is the source that drives organizations in the proper direction. Data enables planning, forecasting, and strategy. For example, retailers rely...

EventLogAnalyzer 5 min read Read

Code Spaces AWS Security Breach: A Sad Reminder of the Importance of Cloud Environment Password Management

In the recently concluded Black Hat USA, 2014, one of the topics that drew much attention was the session on the pitfalls in cloud environment...

Password Manager Pro 4 min read Read

Combat Advanced Cyber Attacks With Shared Security Intelligence

(Originally published in Cyber Defense Magazine, Black Hat special edition) ​In this information age, even the mightiest of enterprises and governments across the globe are worried...

EventLogAnalyzer 3 min read Read

Passwords, King of Authentication: Long Live the King!

This post is a reproduction of an article I wrote that was originally published in Business Computing World. “When you play the Game of Thrones, you...

Password Manager Pro 3 min read Read

Why MSPs Should Take Extra Care in Managing Client Passwords

Passwords on spreadsheets put client networks at risk, along with Managed IT service providers’ credibility and trustworthiness. Managed IT Service Providers (MSPs) deliver a variety of...

Password Manager Pro 5 min read Read

Fully Controlled and Closely Monitored Remote Access, a ​Critical Aspect of DCIM

Without proper data center remote access management, administrators invite security issues and waste time.  With more organizations adopting cloud computing and virtualization, data center operations...

Password Manager Pro 4 min read Read

​The Heartbleed Bug: How to Mitigate Risks with Better Password Management

– – – – – – – – – – – – –  – – –  – – –  – – – – – –...

Password Manager Pro 5 min read Read