Recent Articles by Becky Elliott

Information Security: Defense-in-Depth Style

07/15/19 Ladies and gentlemen, we’ve reached the fifth and final post of this information security...

Logs, Logs, and More Logs: Why You Need SIEM and How to Make It More Effective

07/01/19 Four score and one post ago, we talked about Baltimore’s beleaguered IT department, which...

The Story Patching Tells

06/14/19 In post #3 of this information security series, let’s cover one of the essential componen...

The Weakest (Security) Link Might Be You

06/03/19 In the second post in this information security in a hybrid IT world series, let’s cover ...

When “Trust but Verify” Isn’t Enough: Life in a Zero Trust World

05/22/19 Welcome to the first in a five-part series focusing on information security in a hybrid IT ...