General | March 15, 2018Why automation is the best thing for compliance reporting The main purpose of compliance auditing is to identify how well a company is following...
IT Security | February 14, 2018Breaches at OnePlus and National Stores reinforce the importance of PCI compliance January saw another round of significant credit card data breaches, one of which was the...
Identity and access management | September 14, 2015Monitor Files and Folders Like Never Before Over and over, I get the same question from many admins and security professionals...
Identity and access management | November 21, 2014Auditing vs. Monitoring of Active Directory I just finished a class where I had both auditors and administrators in attendance. It...
EventLog Analyzer | November 5, 2013PCI DSS 3.0: Shifting focus on daily review of ‘security-relevant’ logs to identify suspicious activities [Part-3] Ever since the release of the PCI DSS version 3.0 change highlights by the PCI Security...
Password Manager Pro | October 29, 2013PCI-DSS 3.0: The Stress on Password Protection & Security [Part-2] [In the previous post, we briefly discussed the requirements proposed for PCI-DSS 3.0. In...
Password Manager Pro | October 14, 2013PCI-DSS 3.0: The ‘Security Path’ to Compliance Security and compliance are often used synonymously, even by techies. You can ensure...
Endpoint Central | May 7, 2012Session recording for IT Security The business needs of enterprises are in a constant state of flux. A variety of people,...