Blog

/Blog

Track and Audit Active Directory Access Control Permissions

By |January 14th, 2016|

Access control is used to govern user access to shared resources for security purposes. Active Directory access control is administered at the object level by setting different levels of access, or permissions, to objects. Some […]

Track and Audit Active Directory Group Membership

By |January 14th, 2016|

Active Directory (AD) has two types of groups called Security and Distribution. Distribution groups are used for distribution lists in Exchange and cannot be assigned permissions or rights. Security groups are used for assigning permissions […]

Track and Monitor Active Directory Activity

By |January 14th, 2016|

Active Directory (AD) is a directory service that controls who has access to systems, applications, and data resources across the network. It is therefore very important to get visibility into Active Directory and track activities […]

Detailed Security Folder Permissions with LT Auditor+ Windows Assessment

By |August 21st, 2015|

Overview
This document details how to scan and generate a LT Auditor+ Windows Folder Security Permissions Report to display individual group members for all assigned Group Security Principals on specified folders.

Prerequisites

LT Auditor+ 2013 […]

PCI DSS Compliance Update Regarding Transfer of Responsibilities to Merchants

By |December 23rd, 2014|

The new technology used in credit cards is the chip technology. Cards with chips are known as EMV cards. EMV stands for Europay, MasterCard, Visa. EMV cards come in two flavors – chip and PIN […]

Sony Pictures Hack May Be Costliest Cyberattack Ever

By |December 18th, 2014|

“The unprecedented hack of Sony Pictures which a U.S. official says is linked to North Korea may be the most damaging cyberattack ever inflicted on an American business.
The fallout from the hack that exposed a […]

Officials warn 500 million financial records hacked

By |October 21st, 2014|

WASHINGTON — Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building.

Read full article here

PCI Council Responds to Critics

By |February 3rd, 2014|

The PCI Security Standards Council has no plans to modify its standards for payment card data security in response to high-profile payment card breaches at Target and Neiman Marcus, says Bob Russo, the council’s general […]

Comments Off on PCI Council Responds to Critics

NIST Said Close to Unveiling Draft Cybersecurity Framework By Alexei Alexis

By |October 22nd, 2013|

October 21, 2013 06:13PM ET
Key Development:
NIST said close to releasing draft cybersecurity “framework” for private sector, as part of executive order implementation.
Next Steps:
Agency poised to make announcement as soon as Oct. 22, spokeswoman says.
(BNA) — […]

Comments Off on NIST Said Close to Unveiling Draft Cybersecurity Framework By Alexei Alexis

Cyber Attacks – Today’s Biggest Business Monster

By |September 19th, 2013|

“Cyber attacks are the most menacing threat organizations face today.”

Everyday law enforcement agencies shut down businesses because their computing systems have been turned into attack weapons , critical infrastructure shut down and highly sensitive information […]

Comments Off on Cyber Attacks – Today’s Biggest Business Monster