by Dan Rheault | Apr 20, 2023 | Blog, Thought Leadership
…across the country. Each store has a point-of-sale system that connects to the company’s central inventory and billing system. If the IT team does not have a complete inventory of…
by Dan Rheault | Jul 20, 2022 | Blog
…but all have failed to provide the complete instrumentation to understand both the business and technology when addressing security issues. For example, SIEM provides excellent value, whether you believe it…
by Dan Rheault | Mar 2, 2023 | Blog, Thought Leadership, Vulnerability Management
…you’re thinking: “We forward all that to the SIEM.” It’ll be all right there. SIEMs are the great aggregators of all logs. New tool? Forward the logs. More alerts?…
by Dan Rheault | Jan 18, 2023 | Blog, Thought Leadership
…or other relevant characteristics. For example, consider several servers communicating with a common server. These many servers are likely application servers communicating with a database server. Logins can indicate the…
by Dan Rheault | Jan 10, 2023 | Blog, Thought Leadership
…comply with relevant regulations and standards. Consider the example of HIPAA – personal data should only be accessible by medical staff and not by administrators. The only way to understand…