IT Security

Visit:

Combat Identity Thefts and Advanced Cyber Threats with Password Manager Pro Enterprise Edition

No one is safe out on the virtual streets of cyber world, and security breaches surface quite frequently to remind us of the same. Lately, the U.S. federal agencies are the  favorite hot spots for hackers. Two weeks ago,

Password Manager Pro 3 min read

Microsoft LAPS:  Honest Obituary or False Eulogy to the Death of Passwords?

The famous Latin phrase De mortuis nil nisi bonum (Of the dead, nothing unless good) came to mind last week when Microsoft announced the release of LAPS (Local Administrator Password Solution). Microsoft has been predicting the demise of passwords …

Password Manager Pro 3 min read

How Secure Is Password Manager Pro?

Gone are the days when all you needed was a strong password to guard your data. Now, we live in an era where you not only choose a strong password, but also get a strong and secure password manager. A

Password Manager Pro 5 min read

Hacking Hospitality: How to Fight the Cyber-criminals Targeting Business Travelers

Traditionally, financial institutions have remained the top targets of cyber-criminals across the globe. Of late, hackers are eyeing so many other things thatone would normally consider unworthy of hacking. They are even finding novel ways to

Password Manager Pro 3 min read

Protective, GPG13-Compliant Monitoring Using EventLog Analyzer

The journey to a thousand IT problems begins with a single compliance lapse. Yes, this is the first time you are hearing it! So, tell us how often you’ve walked straight into trouble because you underestimated the importance of

EventLogAnalyzer 3 min read

​​Jimmy Kimmel Sheds Light on Password Security

Ace comedian Jimmy Kimmel, who is known for tickling our funny bones through his television shows, tried a social engineering experiment last week. In the backdrop of high profile cyber-security incidents, he wanted to measure how safe people’s passwords

Password Manager Pro 2 min read

Solving a Cyber Crime Case Like Sherlock Holmes

Solving a Cyber Crime Case like Sherlock HolmesIT security managers lay a lot of emphasis on conducting log forensics investigations. According to the SANS 2013 Digital Forensics Survey, 57% of the respondents said that they conduct forensic investigations to “find and investigate incidents as they are …

EventLogAnalyzer 3 min read

8 Log Management Habits of Highly Effective IT Security Managers

blog_sep2014-19In today’s business environment, data is the source that drives organizations in the proper direction. Data enables planning, forecasting, and strategy. For example, retailers rely on customer behavior data to drive more sales, and CEO’s rely of past performance data …

EventLogAnalyzer 5 min read

Code Spaces AWS Security Breach: A Sad Reminder of the Importance of Cloud Environment Password Management

cloud-security

In the recently concluded Black Hat USA, 2014, one of the topics that drew much attention was the session on the pitfalls in cloud environment security. Normally, such deliberations at security conferences are perceived as hypothetical or purely academic. However, …

Password Manager Pro 4 min read