Blogs

Blog Image

Data Privacy Program from Zero to Hero

As I promised last week, here’s a short article on Developing and Implementing a Data Privacy Program. I hope you will like it and share it with your teams and colleagues. 

Blog Image

Windows Security Event Logs – What to Monitor?

The following is a table of event codes that I’ve found to be extremely valuable to log and monitor in an environment. Some trend more towards general environment health and activity monitoring, however they all have a foothold in security value as well. As always, your environment’s needs and requirements will be different depending on a multitude of other factors such as compliance and log retention, and these should be taken into consideration when choosing what to log – and for how long.

Blog Image

How To Reverse Engineer the SolarWinds Hack

Author: Quentin Rhoads-Herrera, Director of Professional Services

Blog Image

Second Round of Stimulus Provides New Opportunity for Online Scams

This week, Americans nationwide will begin receiving their second round of COVID-related stimulus checks. And just like with the first round, online scammers and malicious actors will no doubt be attempting to scam them out of their money.

Blog Image

Sunburst: A Week in Review

2020 isn’t going down quietly, and what an awful week it has been for the security community. If you were lucky enough to be on vacation, let’s catch up.

Blog Image

Weighing the Value of Managed Security

A shortage of skilled personnel is one of the most serious issues affecting security managers today. Add in challenges in maintaining a complete Security Operations Center (SOC) and the result can be gaps in cyber defense. Managed Detection and Response (MDR) services offer a viable, economical way to counter these drivers of risk.

Blog Image

Death to Vulnerability Management As We Know It

Vulnerability Management concepts are changing. The idea that vulnerability management is limited to scanning alone is being replaced with a wider and more comprehensive view. It’s now transforming to a concept called vulnerability identification, which is an umbrella for any type of service or activity centered around identifying vulnerabilities.

Blog Image

Steps Educational Institutions Are Taking to Defend Their Infrastructures from Cyber Attackers

Just when we thought 2020 couldn’t get any worse, cyber attackers are finding new ways to capitalize on our highly technology-dependent society.

Blog Image

Once More Unto the Breach: An Exploration into Breach Prevention and Response

Organizations continue to learn the hard way that cybersecurity breaches can happen for many reasons at companies of any size and maturity level.

Blog Image

The Democratization of Security: Simplification and Direction for Content Management

Last week, we talked about how life could be made easier through the democratization of security permissions and access.  In particular, we discussed how Microsoft Azure Active Directory (AAD) simplifies user onboarding. There’s a second component to the Democratization of Security that can take this streamlining process even further.