Category: Security

author:

Security

Three SIEM Must-Haves


Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip past defenses. According to the recent Ponemon 2018 Cost of a Data Breach report, …



Security

You Are Here – Visibility & Control


Today, in the fifth post of this six-part series, we’re going to cover the fourth and final domain of our reference model for IT infrastructure security. Not only is this the last domain in the model, it is one of the most exciting. As …


Security

You Are Here – Identity & Access Security


Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape into four domains that each contain six categories. While today’s domain may seem simple, …



Security

You Are Here – Perimeter Security


In part 1 of this series, we covered some of the most prevalent and most promising cybersecurity models and frameworks available today. These are all tools that can help you determine the size and shape of the current information security landscape, and where you …