Security

Technology provides consumers the world at their fingertips, so it should come as no surprise that employees—who are really just consumers in disguise—insist on using their personal devices for work. The BYOD trend undoubtedly creates new opportunities and benefits for both employees and companies. But if it’s done wrong, BYOD can also frustrate employees and…

+ read more

Travis Greene
Feb 5, 2015
8:34 am
Reads:
504
Score:
Unrated
This entry is part 3 of 5 in the series Sentinel Collector SDK 2014 Updates

This article is part of a series of articles diving into the new functionality present in the 2014 Preview Sentinel SDK. Today I will be covering the new documentation options and what they mean for those who have developed collectors previously, as well as all of us developing collectors now and in the future.

By: ab
Jan 15, 2015
3:29 pm
Reads:
354
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
389
Score:
Unrated
This entry is part 1 of 5 in the series Sentinel Collector SDK 2014 Updates

Working as a consultant on things Identity, Access, and Security I get to meddle with some really great products, and Sentinel is among those. Recent work building some customized collectors (for custom applications) has helped me find a few tidbits that I wish would have been more-obvious. Perhaps others, via this series of articles, will…

By: ab
Dec 31, 2014
10:40 am
Reads:
459
Score:
5

There are always configuration options that you find the first time you setup a new system, and then there are some that you find when you are asked for some odd business reason that may not have been as obvious on day one. One of these options for services is the ability to restrict which…

+ read more

By: ab
Dec 12, 2014
9:00 am
Reads:
419
Score:
5

I have to explain Identity & Access Management (IAM) basics to people at lot. So, I created this animated GIF to help explain it to someone who knows nothing about what comes second nature to those of us in the security game: A person uses any one of these devices: Desktop, laptop, tablet, phone, etc….

+ read more

ianyip
By: ianyip
Jul 12, 2013
7:44 am
Reads:
1,378
Score:
Unrated

I know I have been quiet for the previous month, I took a little vacation and started becoming more attune to the discussion surrounding data, analytics, security, privacy and the value of our technologically connected world. First we have to rewind to the end of August when I had my first opportunity to discuss and…

+ read more

HudnallsHuddle
Oct 10, 2012
8:32 am
Reads:
2,373
Score:
Unrated

I had the fantastic opportunity to participate in a live Cloud discussion: Get off my Cloud:  Floating the Risks of Big Data Storage on Huff Post Live during their inaugural week of going live with streaming news and discussions leveraging Google+ Hangouts to bring in live guests. This Cloud and technology thing might be catching…

+ read more

HudnallsHuddle
Aug 24, 2012
8:23 am
Reads:
3,828
Score:
Unrated

There is an exciting (ok, I don’t get out much) proposal from Neil MacDonald, of Gartner, that he calls systematic workload reprovisioning. The idea is to periodically stop and restart instances of programs or workloads on a server, using a vetted set of service executables and dependencies. The process lends itself well to a virtualized…

+ read more

gkhays
By: gkhays
Jul 19, 2011
8:45 am
Reads:
1,874
Score:
Unrated