Latest Posts

Jun 13th, 2017 | | Information Security | Comments Off on Change is Hard

Change is Hard

“If you want to make enemies, try to change something.” was once said by former US President Woodrow Wilson. Any engineer or architect who has ever been involved in network engineering or security would probably...

Jun 5th, 2017 | | Information Security | Threat Intelligence | Comments Off on Do You Have a Crystal Ball?

Do You Have a Crystal Ball?

How do you prepare for the next cyber attack? Do you know what’s coming and are you prepared or do you have to scramble when an attack hits? Even with the best technology and security platforms deployed in your...

May 22nd, 2017 | | Information Security | Comments Off on Survived WannaCry? Now what?

Survived WannaCry? Now what?

So, you survived WannaCry ransomware attack, now what do you do to avoid the next attack? WannaCry targeted a vulnerability that existed in Windows from XP to the latest version of Windows 10 using an exploit...

Apr 30th, 2017 | | Information Security | No Comments

What is ‘Zero Trust’?

Traditional network security approaches are no longer adequate in today’s ecosystem and a new method to protect your network is needed. Many security professionals have begun implementing a new architecture called...

Apr 13th, 2017 | | Information Security | No Comments

Information Security in Bizarro World

The enterprise firewall is not a security device. The Intrusion Protection System will break the network. SSL inspection is an invasion of privacy. Network segmentation is hard. Welcome to Information Security in...

Jan 13th, 2017 | | Information Security | No Comments

The Threat is Real. Protecting Your Organization.

Target, Home Depot, Office of Personnel Management (OPM), Democrat National Committee (DNC), Yahoo; almost every day we hear about some sort of data breach or network attack. It seems to have become a fact of life on...