Security

Latest Posts in

Log Analysis Tools Review: Syslog, Filtering the Most Relevant Events

Who’s passed more than a weekend going almost blind because something in your didn’t work as it should, and it produced, hopefully, thousands of lines of error messages, almost all…

Bringing Ease of Use and Security to Remote Users

The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from…

Who Protects the Protectors?

Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to…

Cloud Native Operational Solutions – Malware Prevention Management

Malware prevention is a very hot topic due to the recent ransomware attacks that have completely crippled several companies and organizations. For most smaller companies, being able to hire a…

5 Strategies for Security and Operations Success

Hybrid IT presents SecOps challenges   The Department of Defense (DoD) has long been at the tip of the spear when it comes to successfully melding IT security and operations…

Balancing Stability and Agility

“The price of reliability is the pursuit of the utmost simplicity.” C.A.R. Hoare, Turing Award lecture.   Software and computers in general are inherently dynamic and not of a state…

I Beat Them to Firing Me! Part Two: Fight Back

How to use network configuration, change, and compliance management (NCCCM) and other monitoring software in response to an actual security breach. If you have not read part one, I would suggest that…

I Beat Them to Firing Me: A Story of Corporate Sabotage

Why network configuration, change, and compliance management (NCCCM) is a must Inspired by former Citibank employee sentencing We’ve all heard horror stories about the disgruntled employee who pillages the office supply…

5 Fundamental Strategies for Cybersecurity

Here’s an interesting article from my colleague Joe Kim, in which he offers suggestions to reduce cybersecurity vulnerabilities. Agencies should focus on the basics to protect against attacks The government’s…

Out of Office: Identifying & Managing Risk

Risk Management is an important part of IT. Being able to identify risks and remediation options can make a huge difference if or when disaster strikes. If you’ve moved part…