Historically, many organizations and personnel have been concerned about user activity monitoring (UAM). Certain business cultures feel that these activities are an invasion of privacy or are distrustful. However, in today’s Internet connected, data driven world, having specific information or data means the difference in being a market leader and being out of business.
Leveraging User Activity Monitoring to Protect Information and Employees from Cyber Threats
By David Monahan on Mar 4, 2015 2:46:04 PM
Last minute 2014 RSA Boycotts Hurt Attendees not RSA
By David Monahan on Jan 16, 2014 8:35:19 PM
With all of the negative attention that the NSA – RSA relationship (or deal) has been getting, many are fired up. If the deal went down anything like it has been reported by Reuters, then rightfully so. However, the last minute boycotts of the RSA event to show disapproval are a bit much.
Recent Surveillance “Revelations” Part 2- What can we do?
By David Monahan on Jan 16, 2014 8:34:55 PM
Introduction and Thoughts About Recent Surveillance “Revelations”
By David Monahan on Jan 16, 2014 8:34:53 PM
Hello everyone! I have been at Enterprise Management Associates for a couple of months now and decided that it is time to write an introduction and blog. For those of you who have been following the blog from Scott Crawford, I hope you will find my blogs stimulating and possibly entertaining. I tend to throw a few zingers in on occasion for a little humor as sometimes security writing can come across a little dry.