Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
A recent audit of the Michigan Department of Technology, Management and Budget (DTMB) identified gaps and deficiencies in how state IT networks are managed and secured, prompting on-the-spot ...
While recently talking with a fellow network admin, I learned about Nipper. While there are many tools available to perform security audits of network devices, Nipper is unique. Let me show you why.
Information security audits are on the rise, as organizations look to not only bolster their security postures, but demonstrate their efforts to other parties such as regulators. Audits, which are ...
Businesses often view data security audit as a stressful and intrusive process. An auditor walks around distracting everybody and meddling in regular company operations. The usefulness of conducting ...
On the surface, security questions surrounding virtual servers don’t seem much different than those for the physical machines on which they run. In fact, starting a virtual security audit by keeping ...
A new audit of state computer systems by the Oregon Secretary of State’s office found that most of the 13 agencies it reviewed lacked adequate security plans, processes or staffing to complete ...
The University of Maryland at College Park has taken significant steps to reduce the likelihood of data breaches like the one that exposed the Social Security numbers and other identity records of ...
President Joe Biden has issued an executive order that all agencies must adopt a multi-factor authentication (MFA) by mid-November 2021. It has become imperative that cybersecurity is included as an ...
I am conducting a network security audit. I ran port scans on all relevent servers and desktop. I used superscan. It revealed a great deal of information ...