by Pete Greco | May 14, 2019 | Risk Management, Security Posture
The topic of the day in security as of late has been Endpoint Detection and Response (EDR). The buzz has created a lot of conversations with our clients about Threat Hunting, Threat Remediation and Indicators of Compromise. The challenge for many of our clients is...
by Pete Greco | May 9, 2019 | Risk Management, Security Posture
Vulnerability scanning, the inspection of the network to detect any potential areas prone to exploit, is an essential part of a strong security posture. But how do you know if the type of scans you’re running, or the frequency of the scans is enough to protect your...
by Todd O'Bert | Apr 30, 2019 | Security Posture
Machine learning and artificial intelligence are some of the biggest buzzwords in IT today, but before you jump on the bandwagon and trade in your old tech, there are a few things you should consider. However, before we get into whether you’re ready to leverage this...
by Todd O'Bert | Apr 4, 2019 | Security Posture
In recent years, there has been a slew of high-profile data breaches, and many of them have something in common — the vulnerability was from a third-party. Every vendor you work with may unknowingly bring weaknesses with them that hackers can exploit to get to your...
by Pete Greco | Mar 26, 2019 | Security Posture
Ransomware is a type of malware that holds a computer or data for ransom, requiring payment for the return of the data or control of the computer. The data being held ransom is often encrypted by the ransomware, which is then unencrypted when payment is received....
by Todd O'Bert | Feb 26, 2019 | Security Posture
Rather than relying on the cloud or data centers, computing is now done at or near the source of the data, otherwise known as the edge. While the cloud is being leveraged for storage and computing power, things have become centralized. But distance can mean latency....