Cover Story

CSP: Keeping NonStop community’s secrets safe

Henry Fonseca

Can you keep a secret? How often have we heard or used that expression? In certain circles, the surest way to spread a story is to suggest that it is secret, even top secret, but for those involved in IT, this is far from the truth.

Articles

Securing The Future Of NonStop

Henry Fonseca

It’s hard to believe that 2021 is almost over. Most of us are still getting used to our post-pandemic lives. And as life slowly returns to normal, we should take a moment to reflect on the challenges and successes of the past year. The end of the year is always a great opportunity to look ahead and set goals for the future. And I am not just talking about those pesky New Year’s resolutions that we quickly forget once February comes along.

Articles

Improve Compliance with File Integrity Monitoring

Henry Fonseca

File integrity monitoring (FIM) exists because change is inescapable for most organizations. From variations in a company’s hardware assets, software programs, configuration states, permissions, and personnel, it is the one constant within IT environments. Some of these modifications may be authorized, while others will cause concern by their unexpected nature. Because of this, FIM is considered a vital requirement for security compliance frameworks to help identify unexpected or malicious activity across critical system files and protect business assets.

July-August2019

PROTECTING YOUR DATA: WHO IS RESPONSIBLE?

Henry Fonseca

There are several different factors to consider when thinking about protecting your data. The subject can be complex and usually involves multiple parties.

Let’s begin with a simple thought exercise. Think about how much personal information you share on a day-to-day basis, online or otherwise. Consider who and what you interact with; applications, devices, websites, humans, corporations, etc. How much time do you spend thinking who has access to your data and what they could do with it? What are some of the things that you do to ensure you are protecting your valuable information?