Cyber Security Institute

Wednesday, September 02, 2009

Five Ways To Meet Compliance In A Virtualized Environment

RSA and VMware have released five best practices for locking down virtual environments and meeting compliance requirements.  The steps comprise platform-hardening, configuration and change management, administrative access control, network security and segmentation, and audit logging.


Tuesday, September 01, 2009

LogLogic Simplifies Security Change Management

LogLogic’, the log and security management leader, today announced general availability of the latest release of its LogLogic Security Change Manager appliance that integrates easily with SEM solutions from LogLogic or other vendors as well as third-party CRM and ticketing solutions.