Tag: cyber security

author:

Security

Protection Methods – The Art of Data Analytics


The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although implementing these recommended best practices won’t make you impervious to all attacks, the concept …







author:

Security

Windows Workstation Logs – Integration


In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The most common way of doing this is by forwarding event logs to a syslog …



author:

Networks

Preparing Defense Networks for Cyberattacks


I’m the new Chief Technologist for our Federal and National Government team, and I’m glad to be joining the conversation with all of you. Here’s an interesting article from my colleague, Joe Kim, in which he argues that military IT professionals can and should …


1

2