Subscribe to our blog!

Post by Category

0 Comments

HISCOX Cyber Readiness Report Says "Detection Is Challenging"

Feb 22, 2017

Category: Cybersecurity, Detection

 

View Post
0 Comments

Technology Research and Advisory Companies Need to Get Real!

Feb 21, 2017

Category: Cybersecurity

Do you ever wonder who these technology research and advisory companies are speaking to when they write recommendations on security. If everyone had eight eyes, ten arms, two brains, and an unlimited budget, security would be spectacular! Well, maybe! Unfortunately, the reality of nature that limits our physiology and budgets dictates something different. 

View Post
0 Comments

Most Dangerous Malware Threats

Feb 2, 2017

Category: Cybersecurity, Threats, Virus, malware

If , you’re connected to the Internet all day. This is why it's crucial to protect and secure your devices and data from malicious software. Malware is a wide range of software applications created with a malicious intent. Unlike legitimate software, malware is installed on your computer without your consent. Malware can be introduced to your computer in a variety of ways such as a virus, worm, ...

View Post
0 Comments

Security Zen and How to Achieve it

Feb 1, 2017

Category: Cybersecurity, malware

Computer technology extends to almost every area of society and social sphere. Our pre-Internet way of life is now consigned to the history books – no one born after the early 1990s has experienced a world without the Internet.

View Post
0 Comments

Advanced Ip Filtering- What it is

Advanced-Ip filtering is a network security tool that allows or denies network traffic based on geographical location. Sometimes referred to as country filtering or blocking, Advanced-Ip filtering allows your network to choose places in the world from which it will accept network traffic. More importantly, innovative designs in Advanced-Ip Filtering enable new and unparalleled levels of precision ...

View Post
0 Comments

Six Ways To Secure Yourself From Online Assailants

We are now in a day of age where we have access to absolutely everything at the tip of our fingers.  With technology so advanced, we can easily check and send emails, shop, surf the web and so much more; but, this also puts a target on our back for stolen information. Have you noticed that there’s always another breaking news headline of a company getting hacked, a store getting their data ...

View Post
0 Comments

Kill Chain Tactics In Network Security

Nov 4, 2016

Category: Network Security, Cybersecurity

I read a good article on Kill Chain tactics. The article subtile was: What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason I understood the thinking, just not applicable for all businesses. Below is the response I wrote. I thought it would be useful to everyone if you're considering this approach. I ...

View Post
0 Comments

Financial Institutions Network Security Is Being Blinded!

Today, Financial institutions (not limited to) are being over run with security logging and alerting. Each new monitoring and alerting device adds more things to consider when evaluating threats on a daily basis. You would think this would help, and is a good thing? It is and isn't at the same time. We bury our faces in reports, sift log after log for the magic bullet, set up countless alerts on ...

View Post
0 Comments

Small Business: Soft Underbelly Of Security

Small businesses are the glue that keeps the economic machine moving around the world. Billions of us the them daily, from coffee to teeth cleaning. Although statistics vary the US small business is estimated to employ between 43%-51% of the workforce.  That's a big number. In a Ponemon small business study dated early 2013 stated:

View Post
0 Comments

The Unavoidable "Whoops" In Network Security

WE all make mistakes, its a human condition, and not curable. In network security when we make mistakes to a configuration, it's referred to as "Fat Fingering". I can say honestly on several occasions in my network youth, while deep into chasing false positives, on gallons of caffeine, and eyes nearly bleeding, I made mistakes.

View Post