A de-provisioning proverb: When a door closes, just make sure you don’t leave a window open

disgruntledA forensic analyst confirmed something that I long believed to be true. One of the greatest threats to an organization comes from within. Not everyone who exits a company leaves with a handshake and a gold watch. Often times there are hard feelings; that the employer wronged the former employee and that employee will exact a matter of revenge or feel justified to extract some sort of perceived compensation. Now this isn’t meant for you to look sideways at the person sitting in the next cubicle. However, access policies  needs to be a part of any company’s  internal risk assessment and security policy.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

Advertisements

When is a stack not a stack? When it’s Unified in the cloud

unifyAll the right tools do not necessarily give you the best visibility across your enterprise–you’ve got SIEM, you employ log management. You even have access and or identity management. Each performs a specific security function for your enterprise, but unless they are working across all your information silos and collaborating their collective capabilities, you still might have vulnerability gaps…like a thoroughbred running with blinders.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

The Genie, The Bottle and BYOD

Mobile and other personal devices further erasing network security perimeter…what’s an IT Guy to do?

Smartphones, tablets and other communication devices are becoming more and more prolific for a company to use. They’re easy, fast and convenient. But sometimes these devices pose unintentional threats to the overall security of an enterprise network. What steps can be taken to ensure a more secure platform and still let users use their BYOD tools?

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE