Security

Latest Posts in

Information Security: Defense-in-Depth Style

Ladies and gentlemen, we’ve reached the fifth and final post of this information security in hybrid IT series. I hope you’ve found as much value in these posts as I have…

Tips for Building a Battle-Hardened Network

The U.S. Army is leading the charge on the military’s multidomain battle concept—but will federal IT networks enable this initiative or inhibit it? The network is critical to the Army’s…

Logs, Logs, and More Logs: Why You Need SIEM and How to Make It More Effective

Four score and one post ago, we talked about Baltimore’s beleaguered IT department, which is in the throes of a ransomware-related recovery. Complicating the recovery mission is the fact that…

The Story Patching Tells

In post #3 of this information security series, let’s cover one of the essential components in an organization’s defense strategy: their approach to patching systems. Everywhere an Attack When did…

The Weakest (Security) Link Might Be You

In the second post in this information security in a hybrid IT world series, let’s cover the best-designed security controls and measures, which are no match for the human element.…

When “Trust but Verify” Isn’t Enough: Life in a Zero Trust World

Welcome to the first in a five-part series focusing on information security in a hybrid IT world. Because I’ve spent the vast majority of my IT career as a contractor…

Neglect These Cybersecurity Fundamentals at Your Peril

“Shiny object syndrome” exists within both the IT and cybersecurity fields. The press loves to focus on the sleekest new security toys or the latest threat-hunting technique. After all, red-team/blue-team…

Get Off the Sidelines With a Proactive Security Solution

The pace of cybersecurity is moving faster than ever, and IT pros have to stay ahead of the game if they hope to stay ahead of hackers. Unfortunately, many organizations…

Help Protect Your Company From a Data Breach

It’s likely no surprise to anyone that the amount of data collected, stored, and analyzed continues to grow exponentially across the globe. From a security perspective, it’s always important to…

SolarWinds Lab Episode 74: Security Tools to Fit Today’s Threats

In this episode, Head Geeks™ Destiny Bertucci and Thomas LaRock will show you how to ward off security dangers using SolarWinds software. See how SQL injection can be rooted out and how…