There are a number of settings that require configuration to enable the correct level of logging and auditing.  This, of course varies by the operating system that is doing the
Read more
Ensuring that meaningful security related information is gathered through the logging process can be challenging.  There must be an understanding of the information that can paint an accurate picture of
Read more
The evolution of wireless networking is not unlike the evolution of computers throughout the last couple of decades.  Wireless networks authentication model first relied on Wired Equivalent Protection (WEP).  WEP
Read more
Managing networks in today's business landscape is increasingly challenging.  Keeping up with routers, switches, and firewalls, as well as the firmware and operating system upgrades can keep a system administrator
Read more
Wireless security is an important aspect of most people's lives today.  There are multiple methods used to ensure that the data traversing wireless networks stay safe.  Likewise, there are many
Read more
The incorporation of the internet of things (IoT) devices into our personal and business lives has brought about a whole new set of challenges.  Understanding the potential risks associated with
Read more
As mentioned in the earlier blog about the Internet of Things, there are significant risks.  Looking at how these various IoT devices become more integrated into enterprise systems, it is
Read more
The Internet of Things (IoT) is a term which is only a few years old.  You may be asking yourself, what exactly is IoT?  When defining IoT, the image to
Read more