Security

Latest Posts in Security

Cybersecurity Fundamentals – Attack Surfaces and Vulnerabilities

In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…

Culture of Data Protection: Development Counts, Too.

In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challenging. In fact, most…

Security Pain Points: Upper Management and Budget

Security should be a top priority for IT professionals within all areas of skills. One of the top pain points is how to convey the story of security to upper…

Cybersecurity Fundamentals – Threat and Attack Terminology

In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few…

Building a Culture for Data Protection

Building a culture that favors protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data…

Disaster Recovery – The Postmortem

So you’ve made it through a disaster recovery event. Well done! Whether it was a simulation or an actual recovery, it was possibly a tense and trying time for you…

AI Should Not Replace Established Security Practices

Here is an interesting article from my colleague Joe Kim, in which he discusses the impact of artificial intelligence on cybersecurity.   Agencies are turning to artificial intelligence (AI) and…

Log Analysis Tools Review: Syslog, Filtering the Most Relevant Events

Who’s passed more than a weekend going almost blind because something in your didn’t work as it should, and it produced, hopefully, thousands of lines of error messages, almost all…

Bringing Ease of Use and Security to Remote Users

The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from…

Who Protects the Protectors?

Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to…