The most recent content from our members.
Over the last 3-4 days, we have been discussing several revelations that came out of the SANS Security Survey 2013. We had a glimpse of how organizations used security reports, how well organizations were equipped to collect security data and correlate that for threat intelligence and more. Now, that takes us to the final…
Targeted attacks in general come with an intent to spy on confidential/sensitive business information such as financial information, proprietary product information and so on. Typically, a highly targeted attack like spear-phishing is targeted at an individual or an organization via emails that contain maliciously crafted…
Transmitting sensitive files online is becoming more risky every day. There are chances that your sensitive corporate data can be easily accessed by 3rd-parties—especially when the file transfers happen over insecure channels, or when data is stored on the public cloud. The most common methods used for this purpose are…
A lot has been discussed thus far, about the need to secure your network and firewalls which are prone to vulnerabilities and attacks. Before getting deep into the solutions that you need to secure our network, you need to understand the factors that determine your network security. Typically, network security starts with…
This series relates technology trends and their implications (face recognition technology, Big Data storage and findability, Wearable Computing and Cyber-citizenship , Surveillance) to perennial IT concerns and challenges. The film Minority Report has served as a helpful point of reference in making the relevant…
These days security breaches, vulnerabilities and threats seem to be in the news more frequently than ever before. The foremost concern that comes to mind is what best you can do to protect your network from data breaches. Attackers and hackers don’t seem to take a break. Hence it becomes all the more important to stay…
This week we are going to discuss Monitoring, Events, and Filters. For the purpose of this blog, I will be using SolarWinds Log & Event Manager (LEM) as our monitoring software. LEM collects, stores, and normalizes log data from a variety of sources and displays that data in an easy to use desktop or web console for…
It looks like you're new here. Sign in or register to get started.