Category: Security

author:

Networks Security

Balancing Stability and Agility

June 11, 2018

“The price of reliability is the pursuit of the utmost simplicity.” C.A.R. Hoare, Turing Award lecture.   Software and computers in general are inherently dynamic and not of a state of stasis. The only way IT, servers, software, or any other thing that has …


Security

I Beat Them to Firing Me! Part Two: Fight Back

May 17, 2018

How to use network configuration, change, and compliance management (NCCCM) and other monitoring software in response to an actual security breach. If you have not read part one, I would suggest that you give that an overview, so you can understand fully how and why this …


Security

I Beat Them to Firing Me: A Story of Corporate Sabotage

May 17, 2018

Why network configuration, change, and compliance management (NCCCM) is a must Inspired by former Citibank employee sentencing We’ve all heard horror stories about the disgruntled employee who pillages the office supply closet and leaves the building waving an obscene gesture, security badge skittering across the …


author:

Networks Security

5 Fundamental Strategies for Cybersecurity

April 3, 2018

Here’s an interesting article from my colleague Joe Kim, in which he offers suggestions to reduce cybersecurity vulnerabilities. Agencies should focus on the basics to protect against attacks The government’s effort to balance cybersecurity with continued innovation was underscored in late 2016 with the …


author:

Security

Windows Workstation Logs – Integration

March 9, 2018

In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The most common way of doing this is by forwarding event logs to a syslog …


author:

Security

Microsoft Workstation Logs – Configuration

February 22, 2018

Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in place. This blog will walk you through configuring event logging on client workstations, and …


author:

Security

Building a Solid Security Foundation to Support the NIST Framework

February 7, 2018

Last year, the White House issued an Executive Order designed to strengthen cybersecurity efforts within federal agencies. The EO requires agencies to adhere to the National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity, popularly known as “the framework.” Henceforth, …



author:

Security

An A-B-C Approach to Improving Security Compliance

January 30, 2018

Security is always an important topic with our government customers. Here’s an applicable article from my colleague, Joe Kim, in which he offers some tips on compliance. Ensuring that an agency complies with all of the various standards can be a job in itself. …