Building a Solid Security Foundation to Support the NIST Framework
02/07/18 Henceforth, the agencies are expected to follow a five-step process: Identify Protect Detect Respond Recover This creates near-term challenges with potentially long-term b…
02/07/18 Henceforth, the agencies are expected to follow a five-step process: Identify Protect Detect Respond Recover This creates near-term challenges with potentially long-term b…
02/07/18 Anyone who has looked at the number of event IDs assigned to Windows events has probably felt overwhelmed. In the last blog, we looked at some best practices events that a…
01/30/18 Security is always an important topic with our government customers. Here’s an applicable article from my colleague, Joe Kim, in which he offers some tips on compliance. E…
01/25/18 Can you have too much of a good thing? Maybe not, but you can certainly have too much of the wrong thing. In my first blog, I introduced the idea that Microsoft event logg…
01/18/18 We’ve all heard the saying, “What you see is what you get.” Life isn’t quite so simple for those focused on security, as what you don’t see is more likely to be what you g…
01/16/18 When organizations first take on the challenge of setting up a disaster recovery plan, it’s almost always based on the premise that a complete failure will occur. With tha…
01/16/18 It’s the time of year when we look toward the future. Here’s an interesting article from my colleague, Joe Kim, where he provides a few predictions. Want a good idea of wh…
01/04/18 In the fast-paced world of IT, can you afford to be a legacy IT pro? This is a concern for many, which makes it worth examining. IT functions have been clearly separated s…
12/20/17 Back in October, I wrote about Shadow IT and how some users are turning to popular file sharing applications like Dropbox, OneDrive, and Google Drive to get their work don…
12/06/17 In this last post of my 5 More Ways I Can Steal Your Data series, I focus on my belief that all data security comes down to empathy. Yes, that one trait that we in technol…
12/06/17 When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA complian…
11/28/17 Over the next few weeks, I will be releasing a series of articles covering the value of data analytics and insight, focusing on five of the key business drivers that I hav…