Latest In

security

You Are Here – A Reference Model for IT Infrastructure Security
December 7, 2018
Chris Grundemann
We made it! This is the final post in this six-part series mapping the cybersecurity landscape through a new reference model for IT infrastructure security. Thank you for coming along…
You Are Here – Endpoint & Application Security
November 1, 2018
Chris Grundemann
So far in this series we have reviewed a few popular and emerging models and frameworks. These tools are meant to help you make sense of where you are and how…
You Are Here – Perimeter Security
October 18, 2018
Chris Grundemann
In part 1 of this series, we covered some of the most prevalent and most promising cybersecurity models and frameworks available today. These are all tools that can help you…
You Are Here – Making Sense of Modern InfoSec
October 12, 2018
Chris Grundemann
Now that we all carry supercomputers complete with real-time GPS mapping in our pockets, a reference to physical maps may feel a bit antiquated. You know the ones I’m talking…
Security Monitoring – It’s All About the Data
September 11, 2018
Natalie Timms
In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential.…
The Hidden Costs of Backup Software
August 31, 2018
James Green
The focus of data protection has changed. Backups and data recovery used to exist primarily to protect against human error or natural disaster. The focus was on recovering from an…
Cross-Referencing Alarms: Network Security Monitoring and Network Outage Notifications
August 30, 2018
Nick Buraglio
As anyone that has run a network of any size has surely experienced, with one alert, there is typically (but not always) a deeper issue that may or may not…
Cybersecurity Fundamentals – Attack Surfaces and Vulnerabilities
July 31, 2018
Natalie Timms
In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…
AI Should Not Replace Established Security Practices
June 18, 2018
Paul Parker
Here is an interesting article from my colleague Joe Kim, in which he discusses the impact of artificial intelligence on cybersecurity.   Agencies are turning to artificial intelligence (AI) and…
Log Analysis Tools Review: Syslog, Filtering the Most Relevant Events
June 15, 2018
Raff Poltronieri
Who’s passed more than a weekend going almost blind because something in your didn’t work as it should, and it produced, hopefully, thousands of lines of error messages, almost all…
1567