Managing Macs

In the past enterprise environment, 9 out of 10 machines on a network were Microsoft® Windows® based. Today, that number is much different. Now, only 1 in 5 machines are Windows, which begs the question – what are the other 4 out of 5 m… Continue reading Managing Macs

Facebook removes 120 cybercrime groups with 300,000 members

Some 120 closed cybercrime and scam groups were identified on Facebook by security journalist Brian Krebs in just two hours of research on April 12. Although Facebook deleted them hours after they were reported, research would likely turn up more group… Continue reading Facebook removes 120 cybercrime groups with 300,000 members

Access Your “Saved for Later” Feedly Items By Hooking Up Dropbox to Feedly

If you come here often you’ve noticed that I’ve been writing a semi-frequent series on using the Feedly API with R. A recent post was created to help someone use the API. It worked for them but — as you can see in the comment — … Continue reading Access Your “Saved for Later” Feedly Items By Hooking Up Dropbox to Feedly

GDPR Is Coming, So What Now for WHOIS Domain Registration Data?

When the European Union General Data Protection Regulation (GDPR) comes into force on May 25, 2018, what will happen to currently-available domain registration data in WHOIS? The GDPR restricts how personal data about natural persons residing in the Eu… Continue reading GDPR Is Coming, So What Now for WHOIS Domain Registration Data?

20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs

Today, I will be going over Control 6 from version 7 of the CIS top 20 Critical Security Controls – Maintenance, Monitoring, and Analysis of Audit Logs. I will go through the eight requirements and offer my thoughts on what I’ve found. Key … Continue reading 20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs

Weaknesses In Hybrid Serverless-Container Apps

One of the common use cases for serverless applications is to serve as an orchestration component for cloud applications. In such cases, serverless functions serve as the glue that holds everything together.
The post Weaknesses In Hybrid Serverles… Continue reading Weaknesses In Hybrid Serverless-Container Apps

Technology for GDPR Compliance: Turning Plans into Action

There?s nothing as important to GDPR compliance as careful strategic planning and following a risk-based approach?except the technology that?s essential to turn plans into action. Here?s a look at the role played by three critical areas of IT working t… Continue reading Technology for GDPR Compliance: Turning Plans into Action

Ransomware Moving into Business-Critical Systems; Employees a Key Weakness, Research Shows

Ransomware attacks are moving away from the consumer space and into business-critical systems, encrypting entire databases and servers, commanding bigger ransom requests and inflicting more damage than ever, according to an analysis of data from 6… Continue reading Ransomware Moving into Business-Critical Systems; Employees a Key Weakness, Research Shows

A RESTful API Delivers Flexibility for Vormetric Application Encryption

Security Application Key Management One of the long standing challenges with security applications that involve data encryption has been key…
The post A RESTful API Delivers Flexibility for Vormetric Application Encryption appeared first on Data Secu… Continue reading A RESTful API Delivers Flexibility for Vormetric Application Encryption