Latest In

security planning

You Are Here – Perimeter Security
October 18, 2018
Chris Grundemann
In part 1 of this series, we covered some of the most prevalent and most promising cybersecurity models and frameworks available today. These are all tools that can help you…
Protection Methods – The Art of Data Analytics
August 28, 2018
Natalie Timms
The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…
Culture of Data Protection: What Your Customers Expect
August 23, 2018
Karen Lopez
We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering.  Today, we’ll be considering the culture of protection the…
Cybersecurity Fundamentals – Attack Surfaces and Vulnerabilities
July 31, 2018
Natalie Timms
In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…
Security Pain Points: Upper Management and Budget
July 26, 2018
Destiny Bertucci
Security should be a top priority for IT professionals within all areas of skills. One of the top pain points is how to convey the story of security to upper…
Building a Culture for Data Protection
July 12, 2018
Karen Lopez
Building a culture that favors protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data…
Bringing Ease of Use and Security to Remote Users
June 15, 2018
Kevin Blackburn
The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from…
Microsoft Workstation Logs – An Introduction
January 18, 2018
Natalie Timms
We’ve all heard the saying, “What you see is what you get.” Life isn’t quite so simple for those focused on security, as what you don’t see is more likely…
Needle In a Hay Stack or Sword in a Straw Pile?
November 21, 2017
Brandon Carroll
I’ve spent countless hours trying to find the perfect tool for the job. In fact, I’ve spent more hours searching at times than I have doing the work. You’ve probably…
12