AI Should Not Replace Established Security Practices
06/18/18 Agencies are turning to artificial intelligence (AI) and machine learning to bolster the United States’ cybersecurity posture. Agencies are dealing with enormous amounts o…
06/18/18 Agencies are turning to artificial intelligence (AI) and machine learning to bolster the United States’ cybersecurity posture. Agencies are dealing with enormous amounts o…
06/15/18 Who’s passed more than a weekend going almost blind because something in your didn’t work as it should, and it produced, hopefully, thousands of lines of error messages, a…
06/15/18 The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from just…
06/14/18 Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to know, or if they j…
06/12/18 Malware prevention is a very hot topic due to the recent ransomware attacks that have completely crippled several companies and organizations. For most smaller companies, …
06/11/18 Hybrid IT presents SecOps challenges The Department of Defense (DoD) has long been at the tip of the spear when it comes to successfully melding IT security and operations…
06/11/18 “The price of reliability is the pursuit of the utmost simplicity.” C.A.R. Hoare, Turing Award lecture. Software and computers in general are inherently dynamic and not of…
05/17/18 How to use network configuration, change, and compliance management (NCCCM) and other monitoring software in response to an actual security breach. If you have not read pa…
05/17/18 Why network configuration, change, and compliance management (NCCCM) is a must Inspired by former Citibank employee sentencing We’ve all heard horror stories about the dis…
04/03/18 Here’s an interesting article from my colleague Joe Kim, in which he offers suggestions to reduce cybersecurity vulnerabilities. Agencies should focus on the basics to pro…
03/13/18 Risk Management is an important part of IT. Being able to identify risks and remediation options can make a huge difference if or when disaster strikes. If you’ve moved pa…
03/09/18 In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. T…