Virtualization Review Finding security problems isn’t easy, with all the information generated by a typical datacenter. It’s worth your time to investigate solutions. A. N. Ananth, CEO of¬†EventTracker, visited to introduce himself and his company, and to discuss the need … Continue reading
A recent Gartner report finds that enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed moving forward. Read more here.
Belleville New-Democrat As the Air Force downsizes many traditional career fields, it is investing massively in one of its top priorities — cybersecurity. Read more here.
IT Business Edge IT Business Edge interviews EventTracker’s A.N. Ananth about the use of cloud-based SIEM technology, like EventTracker Cloud, to meet regulatory compliance in small and midsized businesses. ¬†Read the full article¬†here. ¬†
451 Group This paper, written by analyst Javvad Malik of the 451 Group, discusses EventTracker Cloud, a SaaS monitoring product for networks, systems and applications. ¬†At the lowest level, EventTracker Cloud offers free alerting via text or email for up … Continue reading
IDG Connect NSA revelations have placed an increased emphasis on encryption, with MIT Tech Review labeling 2014 ‚ÄúThe Year of Encryption‚ÄĚ. In a two part special, IDG Connect speaks to seven industry experts, including EventTracker’s CEO, A.N. Ananth, about the … Continue reading
Solution Providers for Retail Ananth’s guest blog discusses why retailers are big targets for hackers and lists some simple steps retailers can take to avoid a POS breach. ¬†Read the full blog, here.
HealthITSecurity.com This article, written by A.N. Ananth,¬†discusses how healthcare organizations can protect themselves and meet compliance requirements without compromising the benefits of USB devices. ¬†Read the full article from HealthITSecurity.com, here.
DarkReading A.N. Ananth comments as a security expert on how to detect attacks in less critical systems. ¬†Read the full article in Dark Reading here.
CSO Online While responding to a vulnerability report submitted in April, ICS-CERT told a researcher that documented, changeable default passwords are not vulnerabilities. But given the risk behind default passwords and the focus on critical infrastructure security, shouldn’t such things … Continue reading