The most recent content from our members.
As we move into the New Year, it is time for us to have a look at some threats that we need to be guarded against. In this blog post, let us look at how Ransomware is likely to become more sophisticated in 2014. Here are a few trends observed this year that may well continue well into 2014, with some new and interesting…
In the first post of this series I discussed the importance of establishing recovery time objectives (RTOs) for each component in your production system. In the second post I covered the comparative demands of performing triage during outages of different magnitudes; one that impacts a set of network devices versus an…
Day 3 at Cisco Live Orlando! The show is in full swing. Patrick and Lawrence discuss the neat things they have seen so far, what’s going on in the booth, cool features you already have in your products that you might not even know about (drop by to get a demo of those), and our cool booth giveaways! Booth #629!
Last week we co-hosted a webcast presented by Randy Franklin Smith of ultimatewindowssecurity.com entitled "Auditing SharePoint Activity for Compliance and Security". For those of you who haven’t thought about it, protecting information by constantly monitoring logs and event data has been the primary course of action to…
Have you been catching the most popular new show from SolarWinds? We certainly hope so! SolarWInds Lab covers technical topics you care about -- with demos, diagrams, discussion and live chat. SolarWinds Lab is hosted each month by our Head Geeks and special guests. As always, we want to know what topics you would like to…
Don’t let SharePoint be your compliance weak point. SharePoint’s exponential growth has caught the eye of regulators who are alarmed with the all the uncontrolled sensitive information being shared. The need to protect that information through auditing, alerting, and reporting grows. Failure to protect your data can result…
I was watching a recent webcast titled, “Protecting AD Domain Admins with Logon Restrictions and Windows Security Log” with Randy Franklin Smith where he talked (and demonstrated) at length techniques for protecting and keeping an eye on admin credential usage. As he rightfully pointed out, no matter how many policies and…
In a previous post I discussed the idea that making your production system optimally available requires knowing the recovery time objective (RTO) of each component. Triage of any operational issue then becomes an exercise in meeting the RTO for each impacted component and for the system overall. In this post I cover the…
Audit - The word alone puts panic in everyone’s heart. The idea of having to do one for your entire network drops you to your knees and makes you reach for that comforting Mountain Dew. If you had network security management software, and had it configured properly, this would be a piece of cake for you. But you don’t. Now…
Ensuring data security is vital in business, most especially in any business that stores and transmits credit cardholder data. Any company with access to cardholder information (financial institutions, retailers, credit card companies, etc.) must ensure that they are in compliance with the standards set by the Payment Card…
It looks like you're new here. Sign in or register to get started.