IT Security

Visit:

Hacking Hospitality: How to Fight the Cyber-criminals Targeting Business Travelers

Traditionally, financial institutions have remained the top targets of cyber-criminals across the globe. Of late, hackers are eyeing so many other things thatone would normally consider unworthy of hacking. They are even finding novel ways to

Password Manager Pro 3 min read

Protective, GPG13-Compliant Monitoring Using EventLog Analyzer

The journey to a thousand IT problems begins with a single compliance lapse. Yes, this is the first time you are hearing it! So, tell us how often you’ve walked straight into trouble because you underestimated the importance of

EventLogAnalyzer 3 min read

​​Jimmy Kimmel Sheds Light on Password Security

Ace comedian Jimmy Kimmel, who is known for tickling our funny bones through his television shows, tried a social engineering experiment last week. In the backdrop of high profile cyber-security incidents, he wanted to measure how safe people’s passwords

Password Manager Pro 2 min read

Solving a Cyber Crime Case Like Sherlock Holmes

Solving a Cyber Crime Case like Sherlock HolmesIT security managers lay a lot of emphasis on conducting log forensics investigations. According to the SANS 2013 Digital Forensics Survey, 57% of the respondents said that they conduct forensic investigations to “find and investigate incidents as they are …

EventLogAnalyzer 3 min read

8 Log Management Habits of Highly Effective IT Security Managers

blog_sep2014-19In today’s business environment, data is the source that drives organizations in the proper direction. Data enables planning, forecasting, and strategy. For example, retailers rely on customer behavior data to drive more sales, and CEO’s rely of past performance data …

EventLogAnalyzer 5 min read

Code Spaces AWS Security Breach: A Sad Reminder of the Importance of Cloud Environment Password Management

cloud-security

In the recently concluded Black Hat USA, 2014, one of the topics that drew much attention was the session on the pitfalls in cloud environment security. Normally, such deliberations at security conferences are perceived as hypothetical or purely academic. However, …

Password Manager Pro 4 min read

Combat Advanced Cyber Attacks With Shared Security Intelligence

(Originally published in Cyber Defense Magazine, Black Hat special edition)

shared-security-intelligence

​In this information age, even the mightiest of enterprises and governments across the globe are worried about cyber-attacks. Not a single day passes by without a story about a …

EventLogAnalyzer 3 min read

Passwords, King of Authentication: Long Live the King!

This post is a reproduction of an article I wrote that was originally published in Business Computing World.

King of Authentication

“When you play the Game of Thrones, you win or you die”. One thing that we have learnt from the popular

Password Manager Pro 3 min read

Why MSPs Should Take Extra Care in Managing Client Passwords

Passwords on spreadsheets put client networks at risk, along with Managed IT service providers’ credibility and trustworthiness.

Password Manager Pro for MSPs

Managed IT Service Providers (MSPs) deliver a variety of IT and network management services to their clients. In particular, small and medium organizations …

Password Manager Pro 5 min read