Architecture and Engineering

July 18, 2018
A Tale Of Two Tools: When Splunk met SecurityCenter

Co-Authors:  Keith Rhea and Alex Nanthavong It was the best of times, it was the worst of times, it was...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
November 24, 2016
Stop by Booth 118 @ AWS re:Invent to Learn How We Can Secure Your Cloud

Read More
April 22, 2015
Are You Under Attack? Exploring the Home Network Perimeter

Discovering remote hosts used to involve dialing every number in a telephone exchange until you got a carrier tone. Finding...

Read More
March 13, 2012
RSA 2012: NSA’s Secure Mobility Strategy

Margaret Salter, technical director of the NSA’s Information Assurance Directorate (IAD) spoke at RSA on Wednesday about NSA’s mobile computing pilot and...

Read More
July 1, 2011
Implementing Security Monitoring in Small and Mid-sized Organizations

I recently had the pleasure of leading a project implementing a security monitoring solution in a small organization. Based on...

Read More
February 21, 2011
The Difficulty In Doing Something Simple

According to my watch, it’s 2011. The popular and pervasive protocols telnet and FTP were first codified in RFCs around...

Read More
September 10, 2010
The Current State of FISMA Part 2: The Chasm Between Compliance and . . Everyone Else

  This is really a direct continuation of the last post in this series . .  the second half of...

Read More