AristotleInsight Blog

Welcome to the Sergeant Laboratories Blog Space. Here we will share news and tips about using AristotleInsight as well as share commentary, stories, and opinions on information security, audit, governance, and compliance topics.

SOLUTION PROVIDES EDUCATIONAL FOCUSED FILTERING FOR CHROMEBOOKS AND PCS

Sergeant Laboratories announced today the ‘Penalty Box‘ for educational filtering is now included with AristotleInsight::K12 for both traditional computers and [...]

Read More

MANAGEMENT BY MEANINGFUL OBJECTIVE

The seemingly continuous disclosure of information security failures demonstrates the consequences of bad governance and bad management. Revered executive teams, boasting MBAs from our [...]

Read More

ARE CYBER SECURITY VENDORS THE WORSE CRIMINALS

There is no doubt that those who maliciously attack IT environments or steal data are criminals who need to be prosecuted. Unfortunately, some of the inventive malware used to commit crimes, [...]

Read More

INFO SECURITY'S LACK OF SOLUTIONS TO TRACK, TREND, AND MEASURE PROCESSES

The security and compliance industry is advancing at a frantic rate, yet due to years of perceived unimportance, still lags behind other departments of enterprise. In other words, security and [...]

Read More

THE CHALLENGE OF BOARD ROOM BUY IN

One of the top complaints raised by CISOs and CSOs is a lack voice in the boardroom. From David Barton, CISO at Websense in an article for csoonline.com: “Too many CISOs are relegated to [...]

Read More

MORE RULES DOESN'T EQUAL BETTER SECURITY

The marketing for just about every SIEM type solution available touts huge numbers of “built-in” or “out of the box” rules included in the solution. The assumption seems to be that 700 built-in [...]

Read More

CUTTING THROUGH THE FOG OF MORE

Originally published via LinkedIn over a year ago, the problem of “The Fog of More” still exists. Security professionals still spend too much time fighting to install, configure and maintain [...]

Read More

THE FRAUD TRIANGLE

The sides forming the standard business fraud triangle are opportunity, pressure, and rationalization. While the triangle was developed well before we became worried [...]

Read More

TRACKING THE AVERAGE TIME TO PATCH

In the past we have discussed prioritizing vulnerabilities, and the importance of eliminating mistakes from the patching process. Today, we discuss a more basic question: Is your vulnerability [...]

Read More

PRIORITIZING VULNERABILITIES

Even organizations with a well-oiled vulnerability detection and patch implementation processes struggle to keep pace with the endless stream of newly discovered vulnerabilities. Although we [...]

Read More

<

1

2

3

>

Page 2 of 3

Schedule a Demo