CYBER SMART: What is the name of the process which information is aggregated to detect suspicious activities?

By Jordan True Question of the Week: What is the name of the process which information is aggregated to detect suspicious activities? Answer: SIEM (Security information and event management) Security Information and Event Management provides a holistic view of data and technology on a network. The process gathers all of the information and allows you to see it from one point of view in order to … [Read more...]

Redhat for Security: Myth or Mantra?

By Jacqueline Lee When it comes to which server operating system is better, you know the score: Redhat for security, Windows Server for easier all-around operation. Yet all tools evolve and assumptions become outdated, particularly the assumption that Linux is immune to security incidents. A Sophos blog post recently pointed out that Redhat — which, along with the NSA, co-developed the … [Read more...]

Will IoT become too much for IT?

By Casper Manes Internet of Things brought a lot of new and very useful stuff in our daily lives, but with the ever-growing number of devices, will our IT infrastructure at one point become unmanageable? Source:: GFI TalkTechToMe-All … [Read more...]

Azure RemoteApp is ending, but alternatives are better

By Sean Bianco Parallels Remote Application Server is back in the news and for good reason: IT experts consider this award-winning application delivery solution a sound alternative to Azure RemoteApp (ARA). Microsoft recently announced that its going to discontinue ARA in 2017 and will partner with Citrix to offer Citrix XenApp Express as an alternative. In light of [...] The post Azure … [Read more...]

Encryption and Government Hacking

We live in a world that is becoming increasingly interconnected – from our smartphones and tablets to our televisions, cars, washing machines, and thermostats. Encrypting the data on these and other devices helps protect against malicious hacking, identity theft, harassment, and other crimes. In addition, encrypting data in motion is critical: hackers and foreign governments seldom have your … [Read more...]

The Rise and Risk of BYOD

The “Bring Your Own Device” (BYOD) trend is no longer new: It is the “new normal” for many companies. Enabling your workforce to use personally-owned devices at work – iPhone 6 anyone? – brings increased productivity and flexibility, yet it also poses rising risks to your company’s data. Rather than respond to these risks with ever-tightening restrictions and policies, IT managers should … [Read more...]

How to Run Microsoft Access on Mac

By Kayla Myrhow Software developers, data architects and power users whom use Macs have expressed a need to run Microsoft Access. Firstly, if you fall into this category, Parallels Desktop for Mac can assist you with developing application software without reformatting or rebooting your machine. Secondly, users can create tables, queries, forms, and reports that connect their projects [...] The … [Read more...]

Altaro at Microsoft Ignite! Booth #2138

By Altaro Software Join us at Ignite next week, we'll be at our Booth #2138 if you want to visit. Meet Altaro VM Backup's creators, our head of support, and Andy Syrewicze.Read the post here: Altaro at Microsoft Ignite! Booth #2138 Source:: altaro … [Read more...]

Tenable Announces New SecurityCenter CV Advanced Threat Detection Course

By David Poynter At Tenable, our goal is to help you transform your security with comprehensive solutions that protect your organization. Yet even with security tools and experienced staff in place, it is often still difficult to detect and identify known and unknown threats and ensure your organization is secure. Today, we are excited to announce a new SecurityCenter CV: Advanced Threat … [Read more...]

PowerShell on Linux: Not Just Windows Anymore

By Adam Bertram On Aug. 18, Jeffrey Snover finally got his wish. It was a wish that we in the PowerShell community knew was eventually coming judging from his tongue-in-cheek responses when asked about it for many months. Windows PowerShell was renamed simply to PowerShell because Windows was no longer its only supported operating system. It was now available on Linux and Mac OS X and, even … [Read more...]