Security Monitoring Infrastructure

June 10, 2018
Inherent Risk Tiering for Third-Party Vendor Assessments

  Importance of Third-Party Risk Tiering It can be a challenging and overwhelming task to adequately manage the risk associated...

Read More
May 9, 2018
Conducting and Detecting Data Exfiltration

How to Conduct and Detect Data Exfiltration Is your organization taking proactive measures to prevent a data breach?  From 2016...

Read More
December 15, 2016
A+: AMI’s, Automation & AWS

A few weeks ago, I attended AWS re:Invent 2016 with nine of my colleagues. If you have never been, re:Invent is...

Read More
November 24, 2016
Stop by Booth 118 @ AWS re:Invent to Learn How We Can Secure Your Cloud

Read More
October 6, 2016
BCDR Series: The intersection of Incident Response and Business Continuity

When most people think of Continuity, they think of bringing a business back online after a fire or a flood....

Read More
October 5, 2015
The AWS Shared Responsibility Model: Part 1 – Security in the Cloud

Cloud Service Providers (CSP) offer a range of infrastructure, platforms, and software for customers to consume. Whether you are looking...

Read More
November 22, 2011
Open Source Security Appliance Reviews (Post 1 in Series)

Readers should know that I consider myself a “hobby deal hunter” who is always looking for the best prices on...

Read More
July 1, 2011
Implementing Security Monitoring in Small and Mid-sized Organizations

I recently had the pleasure of leading a project implementing a security monitoring solution in a small organization. Based on...

Read More