Security

Technology provides consumers the world at their fingertips, so it should come as no surprise that employees—who are really just consumers in disguise—insist on using their personal devices for work. The BYOD trend undoubtedly creates new opportunities and benefits for both employees and companies. But if it’s done wrong, BYOD can also frustrate employees and…

+ read more

Travis Greene
Feb 5, 2015
8:34 am
Reads:
488
Score:
Unrated
This entry is part 3 of 5 in the series Sentinel Collector SDK 2014 Updates

This article is part of a series of articles diving into the new functionality present in the 2014 Preview Sentinel SDK. Today I will be covering the new documentation options and what they mean for those who have developed collectors previously, as well as all of us developing collectors now and in the future.

By: ab
Jan 15, 2015
3:29 pm
Reads:
345
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
378
Score:
Unrated
This entry is part 1 of 5 in the series Sentinel Collector SDK 2014 Updates

Working as a consultant on things Identity, Access, and Security I get to meddle with some really great products, and Sentinel is among those. Recent work building some customized collectors (for custom applications) has helped me find a few tidbits that I wish would have been more-obvious. Perhaps others, via this series of articles, will…

By: ab
Dec 31, 2014
10:40 am
Reads:
441
Score:
5

There are always configuration options that you find the first time you setup a new system, and then there are some that you find when you are asked for some odd business reason that may not have been as obvious on day one. One of these options for services is the ability to restrict which…

+ read more

By: ab
Dec 12, 2014
9:00 am
Reads:
407
Score:
5

I have to explain Identity & Access Management (IAM) basics to people at lot. So, I created this animated GIF to help explain it to someone who knows nothing about what comes second nature to those of us in the security game: A person uses any one of these devices: Desktop, laptop, tablet, phone, etc….

+ read more

ianyip
By: ianyip
Jul 12, 2013
7:44 am
Reads:
1,371
Score:
Unrated

I know I have been quiet for the previous month, I took a little vacation and started becoming more attune to the discussion surrounding data, analytics, security, privacy and the value of our technologically connected world. First we have to rewind to the end of August when I had my first opportunity to discuss and…

+ read more

HudnallsHuddle
Oct 10, 2012
8:32 am
Reads:
2,366
Score:
Unrated

I had the fantastic opportunity to participate in a live Cloud discussion: Get off my Cloud:  Floating the Risks of Big Data Storage on Huff Post Live during their inaugural week of going live with streaming news and discussions leveraging Google+ Hangouts to bring in live guests. This Cloud and technology thing might be catching…

+ read more

HudnallsHuddle
Aug 24, 2012
8:23 am
Reads:
3,819
Score:
Unrated

There is an exciting (ok, I don’t get out much) proposal from Neil MacDonald, of Gartner, that he calls systematic workload reprovisioning. The idea is to periodically stop and restart instances of programs or workloads on a server, using a vetted set of service executables and dependencies. The process lends itself well to a virtualized…

+ read more

gkhays
By: gkhays
Jul 19, 2011
8:45 am
Reads:
1,866
Score:
Unrated