Category: Security


author:

Security

AI Should Not Replace Established Security Practices


Here is an interesting article from my colleague Joe Kim, in which he discusses the impact of artificial intelligence on cybersecurity.   Agencies are turning to artificial intelligence (AI) and machine learning to bolster the United States’ cybersecurity posture.   Agencies are dealing with …



author:

Security

Bringing Ease of Use and Security to Remote Users


The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from just about everywhere possible. Firewalls, malware protection, and other IT security practices are great …


author:

Networks Security

Who Protects the Protectors?


Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to know, or if they just liked to see me lose my cool and say …



author:

Security

5 Strategies for Security and Operations Success


Hybrid IT presents SecOps challenges   The Department of Defense (DoD) has long been at the tip of the spear when it comes to successfully melding IT security and operations (SecOps). Over the past few decades, the DoD has shown consistent leadership through a …


author:

Networks Security

Balancing Stability and Agility


“The price of reliability is the pursuit of the utmost simplicity.” C.A.R. Hoare, Turing Award lecture.   Software and computers in general are inherently dynamic and not of a state of stasis. The only way IT, servers, software, or any other thing that has …


Security

I Beat Them to Firing Me! Part Two: Fight Back


How to use network configuration, change, and compliance management (NCCCM) and other monitoring software in response to an actual security breach. If you have not read part one, I would suggest that you give that an overview, so you can understand fully how and why this …


Security

I Beat Them to Firing Me: A Story of Corporate Sabotage


Why network configuration, change, and compliance management (NCCCM) is a must Inspired by former Citibank employee sentencing We’ve all heard horror stories about the disgruntled employee who pillages the office supply closet and leaves the building waving an obscene gesture, security badge skittering across the …