Blog
November 27, 2017
3 Questions to Assess your Cloud Security Posture for Code Sharing

With the recent Uber hack coming to light, the value and worth of code sharing comes to the forefront of the discussion. The main question for most organization is do you know if your teams are sharing and/or storing data in the cloud? If the answer is yes, then do you also have the ability to ensure…

Read More

November 17, 2017
Mitigating the Cybersecurity Skill Gap

In the security world, we use the phrase, “It’s not if, it’s when” a cybersecurity attack will occur.  These attacks are not solely focused on governments and businesses, but also the everyday internet user. We see news headlines almost on a weekly basis now of a new attack and this will continue to increase. Over the past…

Read More

October 26, 2017
Top 5 Mobility Challenges for Healthcare

Practical Planning for Healthcare IT Experts Unprecedented access to information anytime and anywhere is fueling demand for personalized service delivery in every sector, including healthcare. Medical facilities and providers are expected to enable instant access to patient information from any device while at the same time rigorously protecting data privacy and confidentiality. The challenges are…

Read More

Digital Lock
October 16, 2017
KRACK WiFi WPA2 Vulnerability

Earlier today, it was published that a bug exists termed KRACK (Key Reinstallation Attack) which exposes a fundamental flaw in WPA2. WPA2 is a common protocol used in securing most modern wireless networks. Overview The bug specifically exposes vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of…

Read More

September 20, 2017
Download our Black Hat Briefings Guide 2017

Randy Bohrer Senior Security Architect This past July, I joined thousands of my fellow security resources for six days in Las Vegas. The goal was to learn about new security technologies and cyber attacker techniques. While in Vegas, I also attended Def Con, or what is called “Hacker Summer Camp”. Def Con provides insights into…

Read More

September 11, 2017
Top 6 Higher Education Security Risks and Issues

Sometimes it seems like the security challenges facing American colleges and universities are never-ending. Students and others share user information. Campus visitors pop USB sticks into networked machines. Hackers find their way into an internal network through carelessly discarded information from an open screen or from an infected workstation. Here are six of the things…

Read More

September 1, 2017
2 Reasons why we like the Juniper Networks Cyphort Acquisition

Announced late yesterday, Juniper Networks has agreed to acquire Cyphort. This acquisition has the makings of a positive move in Juniper’s security solution and here’s why: Enhances SkyATP:  I think this was the main driver for this acquisition since SkyATP does provide malware detection & analysis, its adoption has not met industry expectations. The combination…

Read More

July 26, 2017
How to Choose the Right Cloud Mix in 6 Steps

Cloud services are bringing productivity and profit to many companies, but others are getting left behind. Many of the businesses that have not yet adopted the cloud have not done so because a lack of knowledge about how to get there. That’s not surprising. Cloud adoption goes beyond just choosing private, public or hybrid cloud…

Read More

July 20, 2017
Understanding the 23 NYCRR 500 DFS Cyber Security Regulation

What you will learn in this 30 minute Webinar: Banks, financial service orgs, and insurance companies licensed in New York must have a cyber security plan in place based on the NYS Department of Financial Services cyber security regulation.   Understand the work needed to be compliant with 23 NYCRR 500 Components of a risk…

Read More

July 7, 2017
The 4 Compelling Things We Learned at Palo Alto Networks 2017 Ignite Conference

1.  3rd Party Application Framework – This announcement provides a comprehensive set of APIs that can be leveraged by 3rd party application developers to enhance the capabilities of the Palo platform. Similar to an “app store” for the Palo platform, customers will be able to develop, download or purchase extensions that leverage their existing infrastructure…

Read More

1 2 3 6