The most recent content from our members.
We made it! This is the final post in this six-part series mapping the cybersecurity landscape through a new reference model for IT infrastructure security. Thank you for coming along on this journey with me. Now it’s time to take a look at where we’ve been, review the map itself, and discuss how to put it to work in your…
Good morning. I found this this morning over at Hacker News and thought it might be useful. I haven't digested the whole thing, yet, so YMMV... Detecting Spectre and Meltdown Using Hardware Performance Counters | Endgame (I tried to post this in the security section of Monitoring Central, but I can't figure out how...)
Is Shadow IT in your crosshairs? As a network security professional, do you recognize the implications of people taking IT into their own hands and implementing solutions without corporate approval? Let's examine one area that I believe is a huge data security risk in terms of shadow IT: file sharing. Sure, solutions like…
I can summarize this week in three words: THWACKcamp! THWACKcamp! THWACKcamp! I am in Austin this week. If you are able to visit for THWACKcamp, please say hello and let's sit down to talk data. Or bacon. As always, here are some links from the Intertubz that I hope will hold your interest. Enjoy! The Absurdly…
It looks like you're new here. Sign in or register to get started.