Quantcast
Channel: Tom Olzak on Security » log management
Browsing latest articles
Browse All 2 View Live

Image may be NSFW.
Clik here to view.

Written Policy without Process and Oversight is Just Wasted Effort

Whether prompted by regulations or by management intent to comply with security best practices, the first step after creating a security strategy is development of policies.  However, there are some...

View Article



Image may be NSFW.
Clik here to view.

Three controls to deal with a broken Internet…

The Internet is broken.  Browsers are gaping holes in our security frameworks.  Certificates are becoming a liability as cyber-criminals or certificate authority negligence weakens our trust in the...

View Article
Browsing latest articles
Browse All 2 View Live




Latest Images