The evidence from 2015 is clear: traditional signature-based end-point protection is ineffective against the modern attack, which is persistent and targets zero-day vulnerabilities. Here are some factoids for consideration : … Continue reading
Guest blog by EventTracker CEO, A.N. Ananth for Solution Providers for Retail The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that … Continue reading
Information Security Buzz Overworked system administrators and their equally harried managers everywhere would love to hear from vendors that some SILVER BULLET security technology will keep them safe from all … Continue reading
Information Security buzz This post from Izzy at SiftScience describes patterns culled from 6 million transactions over a three month sample. The “fraud” sample consisted of transactions confirmed fraudulent by customers; … Continue reading
Solution Providers for Retail Cybercrime and stealing credit cards has been a hot topic all year. From the Target breach to Sony, the classic motivation for cybercriminals is profit. So … Continue reading
MSPmentor Offers a brief overview of the top 6 reasons EventTracker should be your security information and event management solution. Read the full whitepaper at MSPmentor
Enterprise Security Today Gartner has just published its annual Magic Quadrant report for Security Information and Event Management (SIEM) Technology. In its report, the industry research firm rates 15 vendors … Continue reading
Virtualization Review Finding security problems isn’t easy, with all the information generated by a typical datacenter. It’s worth your time to investigate solutions. A. N. Ananth, CEO of EventTracker, visited to … Continue reading
Computer Dealer News What is the biggest thing in tech news today? It’s not the cloud, and it’s definitely not “managed services.” With the advent of things like Office 365, … Continue reading
A recent Gartner report finds that enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed … Continue reading
Belleville New-Democrat As the Air Force downsizes many traditional career fields, it is investing massively in one of its top priorities — cybersecurity. Read more here.
IT Business Edge IT Business Edge interviews EventTracker’s A.N. Ananth about the use of cloud-based SIEM technology, like EventTracker Cloud, to meet regulatory compliance in small and midsized businesses. Read … Continue reading
451 Group This paper, written by analyst Javvad Malik of the 451 Group, discusses EventTracker Cloud, a SaaS monitoring product for networks, systems and applications. At the lowest level, EventTracker … Continue reading
NetworkWorld EventTracker Cloud is featured as one of NetworkWorld’s Products of the Week. See it here!
IDG Connect NSA revelations have placed an increased emphasis on encryption, with MIT Tech Review labeling 2014 “The Year of Encryption”. In a two part special, IDG Connect speaks to … Continue reading
Solution Providers for Retail Ananth’s guest blog discusses why retailers are big targets for hackers and lists some simple steps retailers can take to avoid a POS breach. Read the … Continue reading
HealthITSecurity.com This article, written by A.N. Ananth, discusses how healthcare organizations can protect themselves and meet compliance requirements without compromising the benefits of USB devices. Read the full article from HealthITSecurity.com, … Continue reading
DarkReading A.N. Ananth comments as a security expert on how to detect attacks in less critical systems. Read the full article in Dark Reading here.
CSO Online While responding to a vulnerability report submitted in April, ICS-CERT told a researcher that documented, changeable default passwords are not vulnerabilities. But given the risk behind default passwords … Continue reading
DarkReading A.N. Ananth comments as an IT Security expert on the key indicators of a data breach. Read the full article in DarkReading, here.
DarkReading A.N. Ananth comments on how to quickly improve analytics work to better understand IT risks and adjust security practices in this DarkReading article. Read it here.
Infosecurity Magazine A risk aware, long-term approach to regulatory compliance budgets is the path toward optimized spending. EventTracker’s AN Ananth explains his Goldilocks strategy. Read the full article here. … Continue reading
SearchCompliance A.N. Ananth comments on how to maintain different regulatory compliance standards with data retention plans and other compliance policies. Read the full article in SearchCompliance here.
Wall Street and Technology EventTracker’s CEO, A.N. Ananth comments on how companies should increase security to protect their networks from hacktivists and disgruntled employees. The full article in Wall Street … Continue reading
XTCA & Compact PCI Systems EventTracker’s CEO, A.N. Ananth comments on the change in SIEM solutions over time, and how social media and the cloud has impacted their growth. Read … Continue reading
Federal Computer Week EventTracker’s CEO, A.N. Ananth, comments on the recent leak of classified information by former NSA contract employee Edward Snowden, who allegedly copied the information onto a thumb … Continue reading
SC Magazine EventTracker has received a 5-star rating and a recommendation from SC Magazine. Strengths: This product is a well-designed enterprise-class tool. Weaknesses: Hard to find a substantial weakness. Verdict: … Continue reading
SC Magazine A.N. Ananth’s article discusses how the IT security budget will fare as spending is closely examined to prepare for budget cuts. Read the full article in SC Magazine, … Continue reading
USA Today A.N. Ananth comments on the emergence of Advanced Volatile Threats and what it could mean for the future of cyber threats. Read the full article in USA Today, here.
IT Business Edge A.N. Ananth comments on protecting not only against the Chinese security threat, but cyber threats in general in this article by IT Business Edge.
SearchSecurity Jagat Shah comments on the executive order issued by Obama that aims to create voluntary cybersecurity standards and best practices. The full article in SearchSecurity can be found here.
Dark Reading A.N. Ananth discusses how companies that use a top-down approach when it comes to regulatory compliance can significantly reduce costs. The full article in Dark Reading can be … Continue reading
GCNnet A.N. Ananth discusses the need for the public sector to take threats seriously and monitor their networks diligently. The full article in GCNnet can be found here.
GCN A.N. Ananth discusses the pros and cons of disabling Java in government agencies. The full article in GCN can be found here.
TechNewsWorld A.N. Ananth discusses the pros and cons of disabling Java to guard against a zero-day attack. The full article in TechNewsWorld can be found here.