The most recent content from our members.
Have you ever struggled to keep up with a flood of compliance report requirements? Or have you found it challenging to distill security data into clear, concise formats for management? Perhaps you've been searching for a SIEM solution that balances simplicity with customization. If you've nodded along to any of these…
What is TISAX®? TISAX® is a European automotive industry-standard information security assessment (ISA) catalog based on key aspects of information security such as data protection, integrity, and connection to third parties. It was developed by the German Association of the Automotive Industry (VDA) for the specific needs…
Last week we co-hosted a webcast presented by Randy Franklin Smith of ultimatewindowssecurity.com entitled "Auditing SharePoint Activity for Compliance and Security". For those of you who haven’t thought about it, protecting information by constantly monitoring logs and event data has been the primary course of action to…
Don’t let SharePoint be your compliance weak point. SharePoint’s exponential growth has caught the eye of regulators who are alarmed with the all the uncontrolled sensitive information being shared. The need to protect that information through auditing, alerting, and reporting grows. Failure to protect your data can result…
What I am looking to do is write a rule that checks three interfaces and looks for the shutdown command on those interfaces. I wrote it like this initially Must contain find string Interface GigabitEthernet2/43 Shutdown That actually did work on a few, because there was no garbage in between. but most of them have stuff in…
Regular expressions are used in many places in the Network Configuration Manager (NCM). Because of technical and historical reasons, NCM uses a few different flavors of regular expressions for different functionality. In this post, I would like to explain the differences and provide references to more detailed…
Hey everyone, I am writing some compliance checks for our Cisco switches and I have one that is checking some of our Access Lists for me. I have them checking to ensure that the required entries are present in the access list in between the start of the access list and the deny any any log at the end and that is working…
All of us own bank accounts and/or use credit cards, don’t we? So there are mighty chances that you’ve heard the term “PCI compliance” quite often. Do you know what it means? We keep hearing the term every now and then as more data breaches are happening, especially because the payment processors are hacked so often.…
In a previous post, we discussed the top 5 reasons why IT admins should automate the network configuration and change management (NCCM) process. So, now that the need is clearly understood, let’s look at the various options available for NCCM automation, along with their pros and cons to help you choose the right fit for…
Whew... It's already April folks. It had me thinking about just how long we've been running monthly missions on thwack. Quick history lesson, the first thwack monthly mission kicked off in January 2013 and we've had once every month since. That's a total of 28 missions (if you include this month) and somehow we've yet to…
It looks like you're new here. Sign in or register to get started.