BrainWave Consulting Company, L.L.C.
  • Home
  • About
  • Services
  • Free Utilities
  • Blog
  • Contact
Select Page

FileHash: Major Update v5.0

by Andrew S. Baker | Sep 2, 2024 | Compliance, IT Operations, Scripting and Automation, Security, Software, Technology

FileHash v5.0 has just been released, and it comes with a focus on making it easier to automate the following two things: Obtain the checksums of a set of files in a directory (and subdirectory), and then use that checksum list to compare the same directory structure...
Yes, You Need to Understand Technology Architecture

Yes, You Need to Understand Technology Architecture

by Andrew S. Baker | Jan 12, 2021 | Business Management, Compliance, Data Privacy, Risk Management, Technology

Yes, you need to understand technology and cybersecurity architecture.  No, it doesn’t matter what your business is about – you need to understand this if you want your business to succeed. No, it’s not “fair”.  No, there’s not enough time in a day. ...
SyslogTally: Grabbing Summary Information from Common Syslog Applications

SyslogTally: Grabbing Summary Information from Common Syslog Applications

by Andrew S. Baker | Oct 5, 2020 | Compliance, IT Operations, Scripting and Automation, Security, Software, Technology

This past month, I put together a new utility, SyslogTally, because I needed to easily and quickly answer a question pertaining to how frequently various scripts were being used in my environment. Original Need This question about script usage frequency first arose...
FileHash: The Quick and Dirty File Integrity Checker

FileHash: The Quick and Dirty File Integrity Checker

by Andrew S. Baker | Jul 12, 2020 | Compliance, IT Operations, Scripting and Automation, Security, Software

Once upon a time, I needed to get a quick and dirty file integrity checking process in place for Windows systems so that we could meet a customer compliance requirement that was growing more and more popular. FIM – File Integrity Monitoring At the time, we were...
Are breaches really inevitable?

Are breaches really inevitable?

by Andrew S. Baker | Aug 2, 2019 | Compliance, Data Privacy, Security, Strategy

Lately, we have been hearing a steady refrain concerning cybersecurity: “It is impossible to guarantee security. Breaches are inevitable.” Is it really so because it is asserted with authority and confidence?  Is it so because it is oft repeated? Inevitably, we are...
Reading Between the Lines of Breach Notifications

Reading Between the Lines of Breach Notifications

by Andrew S. Baker | Jan 18, 2013 | Compliance, Data Privacy, Security

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing something...
« Older Entries

Search Posts

Recent Posts

  • FileHash: Major Update v5.0
  • Increased Vigilance is Strongly Recommended
  • Protecting and Recovering Your Social Media Accounts
  • CyberSecurity 102 for Small Businesses
  • CyberSecurity 101 for Small Businesses
  • Yes, You Need to Understand Technology Architecture

Archives

Categories

  • Business Management (4)
  • Career Management (6)
  • Compliance (11)
  • Corporate Culture (7)
  • Data Privacy (15)
  • Government (3)
  • Hardware (6)
  • Humor (1)
  • IT Operations (11)
  • Lead Generation (1)
  • Multifactor Authentication (2)
  • Personal (4)
  • Policies and Procedures (10)
  • Risk Management (22)
  • Sales and Marketing (1)
  • Scripting and Automation (4)
  • Security (36)
  • Software (14)
  • Strategy (27)
  • Technology (42)

Tags

Breach Breach Notification Business BYOD Cloud Computing Compliance Cybersecurity Data Privacy Deployments Development Governance Identity Theft Incident Response Information Security Information Technology Infrastructure Integration Investments IT Operations Job Market Leadership Malware Management Migrations Mobile Computing News Password Management Personal Policies Project Management Rants Recruitment Resources Risk Assessment Risk Management Risk Mitigation Security Shell Scripting Software Staffing Strategy Technology Utilities Vulnerabilities Webinar
  • Home
  • About
  • Services
  • Free Utilities
  • Contact
  • Facebook
  • X
© 2025 BrainWave Consulting Company, LLC - All Rights Reserved | Website designed by Spencer Taylor