Security monitoring and detection is a critical element of having a secure environment. It gives you visibility into what is happening on your network; without it you are blind to all kinds of attacks, exploits, anomalies, or insider activity.  In an attempt to gain such visibility, enterprises often go out and purchase a high-priced SIEM […]

Read more

When it comes to security operations there are a variety of use cases we can apply and various ways to monitor data. One useful type of use case is behavioral analytics that monitors network activity for large changes in the volume of a particular activity. Fairly quickly, systems – using machine learning – can baseline […]

Read more

Likelihood: Moderate Microsoft released an out-of-band, emergency patch for the Internet Explorer (I.E.) browser. The zero-day remote-code execution vulnerability (CVE-2018-8653) was discovered by Google security researchers. Exploitation of the vulnerability could allow attackers to execute arbitrary code and grant them the same privileges of the current, authorized user. If that user had administrative privileges the […]

Read more

As we wrap up 2018 and move into 2019, it is valuable to take a look back and review the lessons learned from the breaches, evolutions, and developments in cybersecurity. We will be coming out with our 2018 year-in-review and 2019 outlook soon, however, we thought we would give you a bit of a preview […]

Read more

Last week Marriott International breach resulted in over 500 Million compromised records. These records contained personal and private information of individuals across the globe as well as corporate information.  Undoubtedly, those of us who had their information stolen should expect phishing messages designed to steal more information or compromise your computers.  So it is important […]

Read more

This morning news publications across the country reported that Marriott International, the largest hotel chain in the world, suffered a massive data breach affecting over 500 million customers. It is highly likely that this breach impacted your organization or your employees.  It appears that hackers breached the Starwood International reservations site and the breach was […]

Read more

Identifying and choosing a managed security service provider (MSSP) can be time consuming and difficult.  At their core many are very similar, but how do you narrow down your selection and find the one that is right for you and your organization? Among the myriad of criteria you should evaluate, here are five key questions […]

Read more