Security

To the casual observer, the Internet of Things (IoT) is just an ultra-convenient world of smart devices and sensors that can communicate. But behind the shiny exterior of do-everything consumer devices is a vast expanse of data that has the power to change the world. To illustrate the power of data, let me tell you…

+ read more

GeoffWebb
By: GeoffWebb
Mar 12, 2015
7:14 am
Reads:
372
Score:
Unrated

Technology provides consumers the world at their fingertips, so it should come as no surprise that employees—who are really just consumers in disguise—insist on using their personal devices for work. The BYOD trend undoubtedly creates new opportunities and benefits for both employees and companies. But if it’s done wrong, BYOD can also frustrate employees and…

+ read more

Travis Greene
Feb 5, 2015
8:34 am
Reads:
640
Score:
Unrated
This entry is part 3 of 5 in the series Sentinel Collector SDK 2014 Updates

This article is part of a series of articles diving into the new functionality present in the 2014 Preview Sentinel SDK. Today I will be covering the new documentation options and what they mean for those who have developed collectors previously, as well as all of us developing collectors now and in the future.

By: ab
Jan 15, 2015
3:29 pm
Reads:
435
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
476
Score:
Unrated
This entry is part 1 of 5 in the series Sentinel Collector SDK 2014 Updates

Working as a consultant on things Identity, Access, and Security I get to meddle with some really great products, and Sentinel is among those. Recent work building some customized collectors (for custom applications) has helped me find a few tidbits that I wish would have been more-obvious. Perhaps others, via this series of articles, will…

By: ab
Dec 31, 2014
10:40 am
Reads:
556
Score:
5

There are always configuration options that you find the first time you setup a new system, and then there are some that you find when you are asked for some odd business reason that may not have been as obvious on day one. One of these options for services is the ability to restrict which…

+ read more

By: ab
Dec 12, 2014
9:00 am
Reads:
507
Score:
5

I have to explain Identity & Access Management (IAM) basics to people at lot. So, I created this animated GIF to help explain it to someone who knows nothing about what comes second nature to those of us in the security game: A person uses any one of these devices: Desktop, laptop, tablet, phone, etc….

+ read more

ianyip
By: ianyip
Jul 12, 2013
7:44 am
Reads:
1,450
Score:
Unrated

I know I have been quiet for the previous month, I took a little vacation and started becoming more attune to the discussion surrounding data, analytics, security, privacy and the value of our technologically connected world. First we have to rewind to the end of August when I had my first opportunity to discuss and…

+ read more

HudnallsHuddle
Oct 10, 2012
8:32 am
Reads:
2,447
Score:
Unrated

I had the fantastic opportunity to participate in a live Cloud discussion: Get off my Cloud:  Floating the Risks of Big Data Storage on Huff Post Live during their inaugural week of going live with streaming news and discussions leveraging Google+ Hangouts to bring in live guests. This Cloud and technology thing might be catching…

+ read more

HudnallsHuddle
Aug 24, 2012
8:23 am
Reads:
3,910
Score:
Unrated