Archive for 'Services' Category
Our Blog Policy
By Vigilize - Last updated: Monday, January 27, 2020
While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]
Can We Trust Our Technology?
By Vigilize - Last updated: Monday, February 4, 2019
A new exploit involving Apple’s FaceTime is a reminder that our gadgets can be turned against us… An article review. Our regular readers know that we usually try to avoid reporting on current events, but this latest exploit really caught our attention! In short, it is possible to activate the microphone or camera on an […]
Object Access Limitations
By Matt Jolley - Last updated: Monday, March 5, 2018
Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]
When is a Firewall Not Enough?
By Jolley | Hadaway - Last updated: Wednesday, May 31, 2017
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
By The Way
By Dan Hadaway - Last updated: Saturday, February 21, 2015
We’ve got a birthday coming up . . . and part of the Wave is Gratitude! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . BY THE WAY It is occurring to us that coming up on July 24th, 2015, we will be celebrating our 15th […]
Malware Alerts Cost Companies Big
By Vigilize - Last updated: Sunday, January 25, 2015
An article review. Not If You Use Us… A newly released study highlights the rising costs associated with preventing and responding to malware threats. The study was based on a survey of “630 IT and IT security practitioners in the U.S. who are familiar with their organization’s practices for containing malware infections.” The study is […]
VendorBlog
By Dan Hadaway - Last updated: Sunday, August 31, 2014
And now let’s pause to reflect upon vendor risk . . . . “20% of our vendors have malware infections” A recent study reminds us to recognize that even if anti-malware is the least of our worries, that doesn’t mean our partners or customers are controlling it. With almost 20% of your customers’ computers infected with malware, according […]
About Infotex Vulnerability News
By Vigilize - Last updated: Tuesday, October 22, 2013
We take great pride in our attempt to help you become aware of what you need to know via this portal and e-mail announcement system. Just a quick briefing of how we go about filtering the vulnerability news down for our readership.
By Vigilize - Last updated: Saturday, June 9, 2012
IT Governance documentation is both extremely important and extremely difficult to create for IT managers, Information Security Officers, and Compliance Officers alike. infotex has been maturing GLBA and HIPAA templates since before the regulations were law. Our first Acceptable Use Policy was written in 1989. Each time we audit a new client, we learn from […]
Three Teams and a SIEM Webinar Registration
By Bryan Bonnell - Last updated: Wednesday, February 1, 2012
Three Teams and a SIEM Webinar-Movie You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way three teams collaborate in an overall […]
While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]
A new exploit involving Apple’s FaceTime is a reminder that our gadgets can be turned against us… An article review. Our regular readers know that we usually try to avoid reporting on current events, but this latest exploit really caught our attention! In short, it is possible to activate the microphone or camera on an […]
Object Access Limitations
By Matt Jolley - Last updated: Monday, March 5, 2018
Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]
When is a Firewall Not Enough?
By Jolley | Hadaway - Last updated: Wednesday, May 31, 2017
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
By The Way
By Dan Hadaway - Last updated: Saturday, February 21, 2015
We’ve got a birthday coming up . . . and part of the Wave is Gratitude! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . BY THE WAY It is occurring to us that coming up on July 24th, 2015, we will be celebrating our 15th […]
Malware Alerts Cost Companies Big
By Vigilize - Last updated: Sunday, January 25, 2015
An article review. Not If You Use Us… A newly released study highlights the rising costs associated with preventing and responding to malware threats. The study was based on a survey of “630 IT and IT security practitioners in the U.S. who are familiar with their organization’s practices for containing malware infections.” The study is […]
VendorBlog
By Dan Hadaway - Last updated: Sunday, August 31, 2014
And now let’s pause to reflect upon vendor risk . . . . “20% of our vendors have malware infections” A recent study reminds us to recognize that even if anti-malware is the least of our worries, that doesn’t mean our partners or customers are controlling it. With almost 20% of your customers’ computers infected with malware, according […]
About Infotex Vulnerability News
By Vigilize - Last updated: Tuesday, October 22, 2013
We take great pride in our attempt to help you become aware of what you need to know via this portal and e-mail announcement system. Just a quick briefing of how we go about filtering the vulnerability news down for our readership.
By Vigilize - Last updated: Saturday, June 9, 2012
IT Governance documentation is both extremely important and extremely difficult to create for IT managers, Information Security Officers, and Compliance Officers alike. infotex has been maturing GLBA and HIPAA templates since before the regulations were law. Our first Acceptable Use Policy was written in 1989. Each time we audit a new client, we learn from […]
Three Teams and a SIEM Webinar Registration
By Bryan Bonnell - Last updated: Wednesday, February 1, 2012
Three Teams and a SIEM Webinar-Movie You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way three teams collaborate in an overall […]
Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]
Many new firewalls come with Intrusion Prevention Systems, but can’t replace the services of a MSSP. A Jolley | Hadaway Article Many Clients ask a great question related to network monitoring. The question goes like this: Firewalls now come with various services including Intrusion Prevention Systems, (IPS). Why pay a firm like infotex to provide […]
By The Way
By Dan Hadaway - Last updated: Saturday, February 21, 2015
We’ve got a birthday coming up . . . and part of the Wave is Gratitude! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . BY THE WAY It is occurring to us that coming up on July 24th, 2015, we will be celebrating our 15th […]
Malware Alerts Cost Companies Big
By Vigilize - Last updated: Sunday, January 25, 2015
An article review. Not If You Use Us… A newly released study highlights the rising costs associated with preventing and responding to malware threats. The study was based on a survey of “630 IT and IT security practitioners in the U.S. who are familiar with their organization’s practices for containing malware infections.” The study is […]
VendorBlog
By Dan Hadaway - Last updated: Sunday, August 31, 2014
And now let’s pause to reflect upon vendor risk . . . . “20% of our vendors have malware infections” A recent study reminds us to recognize that even if anti-malware is the least of our worries, that doesn’t mean our partners or customers are controlling it. With almost 20% of your customers’ computers infected with malware, according […]
About Infotex Vulnerability News
By Vigilize - Last updated: Tuesday, October 22, 2013
We take great pride in our attempt to help you become aware of what you need to know via this portal and e-mail announcement system. Just a quick briefing of how we go about filtering the vulnerability news down for our readership.
By Vigilize - Last updated: Saturday, June 9, 2012
IT Governance documentation is both extremely important and extremely difficult to create for IT managers, Information Security Officers, and Compliance Officers alike. infotex has been maturing GLBA and HIPAA templates since before the regulations were law. Our first Acceptable Use Policy was written in 1989. Each time we audit a new client, we learn from […]
Three Teams and a SIEM Webinar Registration
By Bryan Bonnell - Last updated: Wednesday, February 1, 2012
Three Teams and a SIEM Webinar-Movie You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way three teams collaborate in an overall […]
We’ve got a birthday coming up . . . and part of the Wave is Gratitude! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . BY THE WAY It is occurring to us that coming up on July 24th, 2015, we will be celebrating our 15th […]
An article review. Not If You Use Us… A newly released study highlights the rising costs associated with preventing and responding to malware threats. The study was based on a survey of “630 IT and IT security practitioners in the U.S. who are familiar with their organization’s practices for containing malware infections.” The study is […]
VendorBlog
By Dan Hadaway - Last updated: Sunday, August 31, 2014
And now let’s pause to reflect upon vendor risk . . . . “20% of our vendors have malware infections” A recent study reminds us to recognize that even if anti-malware is the least of our worries, that doesn’t mean our partners or customers are controlling it. With almost 20% of your customers’ computers infected with malware, according […]
About Infotex Vulnerability News
By Vigilize - Last updated: Tuesday, October 22, 2013
We take great pride in our attempt to help you become aware of what you need to know via this portal and e-mail announcement system. Just a quick briefing of how we go about filtering the vulnerability news down for our readership.
By Vigilize - Last updated: Saturday, June 9, 2012
IT Governance documentation is both extremely important and extremely difficult to create for IT managers, Information Security Officers, and Compliance Officers alike. infotex has been maturing GLBA and HIPAA templates since before the regulations were law. Our first Acceptable Use Policy was written in 1989. Each time we audit a new client, we learn from […]
Three Teams and a SIEM Webinar Registration
By Bryan Bonnell - Last updated: Wednesday, February 1, 2012
Three Teams and a SIEM Webinar-Movie You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way three teams collaborate in an overall […]
And now let’s pause to reflect upon vendor risk . . . . “20% of our vendors have malware infections” A recent study reminds us to recognize that even if anti-malware is the least of our worries, that doesn’t mean our partners or customers are controlling it. With almost 20% of your customers’ computers infected with malware, according […]
We take great pride in our attempt to help you become aware of what you need to know via this portal and e-mail announcement system. Just a quick briefing of how we go about filtering the vulnerability news down for our readership.
By Vigilize - Last updated: Saturday, June 9, 2012
IT Governance documentation is both extremely important and extremely difficult to create for IT managers, Information Security Officers, and Compliance Officers alike. infotex has been maturing GLBA and HIPAA templates since before the regulations were law. Our first Acceptable Use Policy was written in 1989. Each time we audit a new client, we learn from […]
Three Teams and a SIEM Webinar Registration
By Bryan Bonnell - Last updated: Wednesday, February 1, 2012
Three Teams and a SIEM Webinar-Movie You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way three teams collaborate in an overall […]
IT Governance documentation is both extremely important and extremely difficult to create for IT managers, Information Security Officers, and Compliance Officers alike. infotex has been maturing GLBA and HIPAA templates since before the regulations were law. Our first Acceptable Use Policy was written in 1989. Each time we audit a new client, we learn from […]
Three Teams and a SIEM Webinar-Movie You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way three teams collaborate in an overall […]