Data Classification
Data Classification – Determining what constitutes “sensitive data” is usually not a difficult thing for most people. For me personally, it would be my social security #, my account information – banking, credit card information. And, sadly as the years go by, my birthdate is getting to be more sensitive… (more…)
Cyber Security Awareness Training – It’s the smart thing to do!
Cyber Security Awareness Training – There is plenty of technology that can be applied in all manner of ways to help protect against a breach, but if the employee culture doesn’t embrace being mindful of security, it makes the CISO’s job a little harder. (more…)
Configuring Log Event Source Series – Sun Solaris (7, 8, 9 & 10)
Configuring Log Event Source Series – Sun Solaris (7, 8, 9 & 10), Welcome to another post in the series of configuration instructions in enabling monitored systems to send system logs to a central logging server. (more…)
Best Practices Series: VMware Storage Management Best Practices
Welcome for another blog post in our cyber security best practices series. (more…)
Best Practices Series: Virtual Networking for VMware
Best Practices – A growing number of organizations are now standardizing in a virtualized server deployment and they want to consolidate servers that belong to different trust zones. A trust zone is loosely defined as a network segment within which data flows relatively freely, whereas data flowing in and out of the trust zone is subject to stronger restrictions. The introduction of virtual technology does (more…)
Configuring Log Event Source Series – IBM AIX
Welcome to our first post in the series of configuration instructions in enabling monitored systems to send system logs to a central logging server.
This configuration instruction contains the following information for configuring an IBM AIX event source. The tested platform is based on IBM AIX version 4.x and 5.x (Security and Authentication messages only).
By default, an AIX system will not (more…)
Configuring Log Event Source Series – HP UX
Welcome to another post in the series of configuration instructions in enabling monitored systems to send system logs to a central logging server – HP UX. (more…)
What Is Data Loss Prevention (DLP)?
A quick Google on “Data Loss Prevention Definition” results in the following definition from a couple different sources: (more…)