-
You Are Here - Part 1 - Making Sense of Modern InfoSec
Now that we all carry supercomputers complete with real-time GPS mapping in our pockets, a reference to physical maps may feel a bit antiquated. You know the ones I’m talking about; you can still find them at many malls or theme parks, and even some downtown city streets. It’s usually a backlit map on a pillar with a…
-
Security Monitoring – It’s All About the Data
In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential. What happens if a threat is detected? What can we do to monitor for threats? This final blog will look at security…
-
Protection Methods - The Art of Analytics
The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although implementing these recommended best practices won’t make you impervious to all attacks, the concept…
-
Policy and Controls – A Foundation for Threat Protection
In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several methodologies that can be part enterprise protection plan. Let’s first clarify “protection.” There is no silver bullet for preventing all attacks.…
-
Cybersecurity Fundamentals - Threat and Attack Terminology
In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few weeks, we’ll build on this introductory knowledge, and review more complex terms and methodologies that will help you build confidence…
-
Making Friends: Optimizing IT and Security Resources
As we approach the end of National Cyber Security Awareness Month, it’s time to focus on ways to improve your current staff and resources. In light of our country’s current security skills shortage (more than 50 percent of 600+ companies surveyed indicated that it takes roughly three to six months to fill cyber security…
-
What Do You Mean it Doesn’t Have an IP Address?
We are becoming an IP-connected world. Home energy, city lights, cars, television, coffee machines, IP-enabled mobile devices, home security cameras, watches, manufacturing process automation, Star Trek-like hospital monitoring beds, you name it. If it’s been built in the last five years and has any kind of management or…
-
IT security tales from the crypt…err data center
I was working in the data center, late one night When my eyes beheld an eerie sight For my SIEM began to screech And suddenly there was a breach… Ok, ok—that was a bit cheesy. But hey, it’s October, which means two things: * It’s Cyber Security Awareness Month * It’s almost Halloween So how could we not take advantage of…
-
Is Hyperconnectivity Completely at Odds With Security?
Happy Columbus Day! We all want ready access to email and other critical apps from every device, on any network, all the time. We want to use company equipment and home equipment interchangeably because we work from different locations throughout the day. As if all this wasn’t hard enough for your IT security team, just…
-
Security Awareness for Any Organization
Remember grade school fire drills? Teachers demonstrated how to line up; they tested the door for heat; explained how dangerous smoke is; and a few times a year the obnoxiously loud bell rang and we’d all walk (not run) to the nearest exit. I’ll bet that fire safety ritual is forever etched in your mind, but do you know…