Stories by Neil Roiter

Vulnerability management tools: Dos and don'ts

<strong>DON'T shortchange remediation.</strong> Surprisingly, organizations will perform vulnerability scans, or hire someone to conduct a scan, get a report and then not follow through. They may cherry-pick one or two critical items and neglect the rest. The result is that the organization has spent time and money without doing much for its security.

Written by Neil Roiter15 Feb. 11 07:38

Firewall audit tools: features and functions

Firewall audit tools automate the otherwise all-but-impossible task of analyzing complex and bloated rule sets to verify and demonstrate enterprise access controls and configuration change-management processes.

Written by Neil Roiter12 May 10 05:02
[]