Yes, you read the headline right. And no, this outage isn’t the first of its kind. Ericsson, the Swedish multinational networking and telecommunications company, joins the list of...
Industry best practices for endpoint security
Lately, hackers on the lookout for vulnerable systems have kept the IT industry busy. While various OS and software vendors strive to keep their users’ data intact by...
Simplifying security auditing, part 6: Compliance and the cloud
In part 5, we looked at auditing your network device logs. A decade ago, security professionals were primarily concerned about network perimeter and endpoint security....
Simplifying security auditing, part 5: Detecting network attacks
Anyone trying to access resources in your network needs to interact with your network devices: firewalls, routers, switches, and IDS/IPSs. Each of these devices generate syslogs that...
Chrome’s removing the “Secure” label from HTTPS sites—but why?
Gone are the days when the green “Secure” label stood to distinguish legitimate websites from potentially malicious ones. Shortly after marking all HTTP sites with a “Not Secure”...
Simplifying security auditing, Part 3: Keeping insider threats in check
Insider threats are on the rise. In fact, both administrators and average employees are among the biggest security threats in an organization. When it comes to security auditing, there are...
Simplifying security auditing, Part 1: Regularly reviewing server activity
Everyone knows about the importance of log management in IT security. Yet, organizations struggle with implementing effective log management techniques in their networks. This blog series aims to...
Network breach at Australian National University serves as a reminder about the Notifiable Data Breaches scheme
Earlier this month, several news outlets reported that Australian National University’s (ANU) network was breached, allegedly by Chinese hackers. Although the official statement from ANU said that the...
How to leverage SIEM to meet the GDPR’s requirements
Today’s businesses run on data. From getting customer information for payment, processing employee information for payroll, using publicly available data for targeted advertising, to tracking people’s behavior for marketing,...