HealthITSecurity.com This article, written by A.N. Ananth, discusses how healthcare organizations can protect themselves and meet compliance requirements without compromising the benefits of USB devices. Read the full article from HealthITSecurity.com, here.
DarkReading A.N. Ananth comments as a security expert on how to detect attacks in less critical systems. Read the full article in Dark Reading here.
CSO Online While responding to a vulnerability report submitted in April, ICS-CERT told a researcher that documented, changeable default passwords are not vulnerabilities. But given the risk behind default passwords and the focus on critical infrastructure security, shouldn’t such things … Continue reading
DarkReading A.N. Ananth comments as an IT Security expert on the key indicators of a data breach. Read the full article in DarkReading, here.
DarkReading A.N. Ananth comments on how to quickly improve analytics work to better understand IT risks and adjust security practices in this DarkReading article. Read it here.
Infosecurity Magazine A risk aware, long-term approach to regulatory compliance budgets is the path toward optimized spending. EventTracker’s AN Ananth explains his Goldilocks strategy. Read the full article here.
SearchCompliance A.N. Ananth comments on how to maintain different regulatory compliance standards with data retention plans and other compliance policies. Read the full article in SearchCompliance here.
Wall Street and Technology EventTracker’s CEO, A.N. Ananth comments on how companies should increase security to protect their networks from hacktivists and disgruntled employees. The full article in Wall Street and Technology can be found here.
XTCA & Compact PCI Systems EventTracker’s CEO, A.N. Ananth comments on the change in SIEM solutions over time, and how social media and the cloud has impacted their growth. Read the entire article in XTCA & Compact PCI Systems here.
Federal Computer Week EventTracker’s CEO, A.N. Ananth, comments on the recent leak of classified information by former NSA contract employee Edward Snowden, who allegedly copied the information onto a thumb drive. Read the entire article in Federal Computer Week here.