Leveraging User Activity Monitoring to Protect Information and Employees from Cyber Threats

By David Monahan on Mar 4, 2015 2:46:04 PM

Historically, many organizations and personnel have been concerned about user activity monitoring (UAM). Certain business cultures feel that these activities are an invasion of privacy or are distrustful. However, in today’s Internet connected, data driven world, having specific information or data means the difference in being a market leader and being out of business.

Continue Reading

Last minute 2014 RSA Boycotts Hurt Attendees not RSA

By David Monahan on Jan 16, 2014 8:35:19 PM

With all of the negative attention that the NSA – RSA relationship (or deal) has been getting, many are fired up.  If the deal went down anything like it has been reported by Reuters, then rightfully so.  However, the last minute boycotts of the RSA event to show disapproval are a bit much.

Continue Reading

Recent Surveillance “Revelations” Part 2- What can we do?

By David Monahan on Jan 16, 2014 8:34:55 PM

I hope you were able to read part 1 of this blog prior to coming to this part as it really sets the stage.
Continue Reading

Introduction and Thoughts About Recent Surveillance “Revelations”

By David Monahan on Jan 16, 2014 8:34:53 PM

Hello everyone!  I have been at Enterprise Management Associates for a couple of months now and decided that it is time to write an introduction and blog.  For those of you who have been following the blog from Scott Crawford, I hope you will find my blogs stimulating and possibly entertaining.  I tend to throw a few zingers in on occasion for a little humor as sometimes security writing can come across a little dry.

Continue Reading
  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts