In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…
In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few…
We all know that security concerns go hand in hand with IoT. Here’s an interesting article from my colleague Joe Kim, in which he suggests ways to overcome the challenges.…
In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The…
Modernizing legacy systems is back on the front burner. Here’s an interesting article from my colleague, Joe Kim, in which he reminds us not to forget about the network. The…