cyber security

Tag: cyber security

Security Monitoring – It’s All About the Data

In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential.…

Protection Methods – The Art of Data Analytics

The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…

Policy and Controls – A Foundation for Threat Protection

In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…

Cybersecurity Fundamentals – Threat and Attack Terminology

In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few…

Fortifying your Networks Against the Coming Internet of Things (IoT) Tsunami

We all know that security concerns go hand in hand with IoT. Here’s an interesting article from my colleague Joe Kim, in which he suggests ways to overcome the challenges.…

Windows Workstation Logs – Integration

In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The…

Everyone Should Get Behind Modernizing Federal IT Networks

Modernizing legacy systems is back on the front burner. Here’s an interesting article from my colleague, Joe Kim, in which he reminds us not to forget about the network. The…

Preparing Defense Networks for Cyberattacks

I’m the new Chief Technologist for our Federal and National Government team, and I’m glad to be joining the conversation with all of you. Here’s an interesting article from my…