Security Tools

Basic NMap Scans II

5 Basic NMap scans II In this second part of the series on NMap, we will continue to expand on a basic understanding of the tool by exploring more scanning techniques. We will continue to use the GUI to provide easier to follow examples. In our first article we covered the following scans: SYN Connect […]

IT Security, Firewall policy, Firewall Managment

Firewall Policy Management is Lacking in IT Security

Businesses today have state-of-the-art security on their systems, including the latest standards in firewall technology. But all of that technology may be wasted if the right firewall policy aren’t in place. According to a new report from FireMon, although most businesses find firewall security important, security administrators feel that managing those firewalls is complex and […]

siem-image

Enterprises Blindly Battle Cyberthreat Intelligence with SIEM

Business owners may be deploying the latest technology to address cyberthreats, but many still aren’t sure what threats they’re facing. This according to a new study from the SANS Institute, which polled organizations about their activities to prevent cyberthreat intelligence from disrupting their organizations. While 55 percent of organizations responding admitted to using security information […]

Sailpoint SIEM

It is true that implementing SIEM system in an organization is a tough job mainly because of the costs and complexities involved, but still many organizations have to go through the implementation process mainly because it is an integral part of the compliance process. Moreover, it has also become a kind of a standard and […]

Onward!!!

The Adventure continues!!  Welcome to the initial edition of my blog – Where I Sit.  You might very well be wondering why I, as the Sales Director of a People Services company, am writing a blog in the first place and, more importantly, why you would want to read it.   Actually, the answer is […]