`

Articles

July 18, 2018
A Tale Of Two Tools: When Splunk met SecurityCenter

Co-Authors:  Keith Rhea and Alex Nanthavong It was the best of times, it was the worst of times, it was...

Read More
July 5, 2018
Hardware Vulnerability: Understanding Spectre, Meltdown and the Price of Unchecked Modernization

Firewalls, encryption, antivirus software, armed security guards, dual authentication and every other added security mechanism that exists to secure data,...

Read More
June 26, 2018
Guide to Creating a Cybersecurity Challenge for Kids

By:  Stephanie Carruthers and Nolan Kennedy “Right now, we’ve got about 300,000 unfilled cybersecurity positions as a nation,” said Rick...

Read More
May 9, 2018
Conducting and Detecting Data Exfiltration

Is your organization taking proactive measures to prevent a data breach?  From 2016 to 2017, the number of data breaches...

Read More
April 3, 2018
CloudFront Hijacking

I recently spent some time exploring the issue of CloudFront domain hijacking. This is not a new issue but I...

Read More
September 6, 2017
Improving Provisioning in VMware with Ansible

This coming Thursday, September 7th, MindPoint Group VP for Information Security and Privacy Matt Shepherd will be presenting “Where to...

Read More
December 15, 2016
A+: AMI’s, Automation & AWS

A few weeks ago, I attended AWS re:Invent 2016 with nine of my colleagues. If you have never been, re:Invent is...

Read More
November 27, 2016
The AWS Shared Security Model – Part II: A Step Towards FedRAMP Compliance

If you have a cloud service offering that you are trying to market to the Federal Government, chances are you’ve...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
November 7, 2016
Voter Privacy vs. the Security of the Electronic Voting System

As technology continues to permeate every facet of life, individuals are continuously faced with decisions that test the balance between...

Read More
November 3, 2016
Open or Closed: The Data on Your Mobile Device is Still Accessible

Ten years ago, the biggest concern we had regarding our mobile phone was losing it (or worse, having it stolen)....

Read More
October 27, 2016
When Perception is Not Reality: Perspectives on State-Sponsored Hacking and Retaliation

NBC News recently reported that the CIA is poised to launch a retaliatory cyber-attack against Russian computer systems. This comes...

Read More
1 2 34 5 6