Blog
How to Get Started with NIST 800-171 Compliance
By Kevin Jackson on Fri, 09/22/2017
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Blog
Five Causes of Performance Bottlenecks in IT
Wed, 08/09/2017
As IT infrastructures continue to grow more complex, finding performance bottlenecks gets hard. That’s why it’s absolutely essential that IT teams have the tools, training, and resources necessary to quickly identify causes of poor application performance.
Blog
Build or Buy: Multi-Factor Authentication Software for IBM i
By Robin Tatam on Mon, 04/24/2017
PCI’s MFA requirements now apply to IBM i. You have two choices: purchase MFA software that’s designed for IBM i or write your own program to link your existing MFA solution to IBM i. What's the best option for your organization?
Blog
How Exit Programs Make the Greatest Impact on IBM i Security
By Robin Tatam on Tue, 03/28/2017
What do exit points have to do with cybersecurity? How do exit programs work? Robin Tatam provides a clear explanation in this video.
Blog
What Does GDPR Mean to an IT Manager, CTO, or Systems Admin?
By Donnie MacColl on Fri, 03/10/2017
GDPR will affect Chief Technology Officers to System Admins and all levels of seniority in between. By preparing for GDPR now, you can anticipate its effects instead of being surprised.
Blog
PCI Compliance is Only the Beginning of Security
By Robin Tatam on Wed, 03/08/2017
The recent string of breaches at prominent retailers such as Target and Neiman Marcus demonstrated that too many organizations still falsely equate PCI compliance with comprehensive security. Fully compliant organizations are being hit with attacks that compromise payment card data on a regular basis.
Blog
PCI Compliance Takeaways from the Target Data Breach
By Robin Tatam on Wed, 03/08/2017
Smack in the middle of the holiday shopping season, Target was hit with a malware attack that infiltrated its point-of-sale systems and enabled the theft of credit card numbers and personally identifiable information from more than 70 million shoppers.
Blog
What to Know about the New NIST Cybersecurity Framework
By Robin Tatam on Wed, 03/08/2017
Compiled with significant input from the private sector, the Cybersecurity Framework isn’t a prescriptive compliance document and instead gives companies significant leeway in how they use it to inform their security strategies. As a relatively new source of guidance, its implications for regulated industries aren’t clear yet.
Blog
3 Key Skills of a Successful Security Administrator
By Robin Tatam on Tue, 03/07/2017
The constantly changing cybercrime landscape paired with the speed of new technologies can make it difficult to know which skills a security administrator should focus on.
Blog
How DR Compliance Requirements Impact HA Decisions
By Tom Huntington on Wed, 03/01/2017
Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.