Latest In

cyber security

Policy and Controls – A Foundation for Threat Protection
August 14, 2018
Natalie Timms
In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…
Cybersecurity Fundamentals – Threat and Attack Terminology
July 18, 2018
Natalie Timms
In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few…
Fortifying your Networks Against the Coming Internet of Things (IoT) Tsunami
March 20, 2018
Paul Parker
We all know that security concerns go hand in hand with IoT. Here’s an interesting article from my colleague Joe Kim, in which he suggests ways to overcome the challenges.…
Windows Workstation Logs – Integration
March 9, 2018
Natalie Timms
In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The…
Everyone Should Get Behind Modernizing Federal IT Networks
February 6, 2018
Paul Parker
Modernizing legacy systems is back on the front burner. Here’s an interesting article from my colleague, Joe Kim, in which he reminds us not to forget about the network. The…
12