Posts by Caleb Kwong
Agentless Network Monitoring with Armis
Almost every professional environment is now filled with interconnected devices. From corporate enterprises to the healthcare and manufacturing industries, many organizations now maintain their own internet of things (IoT). Such interconnection can reduce overhead and streamline processes, but it also opens up company networks to a wide range of new security risks. The truth is…
Read MoreLegacy Systems and Security
It’s time to rethink the industry’s approach to cybersecurity. The conventional strategy of defending perimeters by guessing at threats is currently outmatched. Today’s attacks easily bypass yesterday’s security controls, and modern organizations now demand a deeper level of defense. The solution lies in automated, runtime protection rather than reactive detection and response. This novel approach…
Read MorePatch and Vulnerability Management with Tanium
Legacy endpoint security solutions are failing modern organizations. They were built to protect limited, on-site systems that rarely changed over time. However, today’s CIOs and their teams are expected to manage countless endpoints distributed across diverse network configurations. Each comes with its own set of vulnerabilities that must be monitored in real-time to ensure performance.…
Read MorePrisma Cloud from Palo Alto Networks
Cloud-based applications are being created and deployed at such rapid rates that security teams often struggle to keep up. The need for an integrated cloud security solution is evident, and Palo Alto Networks has the answer. Its Prisma Cloud platform is the industry’s leading cloud-native security solution.
Read MoreWhat is Application Security?
Mobile and web-based application security is a broad topic. It involves developing and testing features that prevent vulnerabilities from various attack vectors. Secure applications protect users and their data from being compromised by malicious actors. Here we take a moment to explore the topic of application security in detail.
Read MoreArctic Wolf MDR
Arctic Wolf’s cutting-edge managed detection and response (MDR) solution offers 24/7 real-time incident response and containment. We’re reviewing some of the main benefits of this system.
Read MoreCMMC 2.0: A New Federal Standard
The US Department of Defense (DoD) knows cyber security is critical. DoD contractors are a major target of frequent, complex attacks. In 2020, the DoD started the Cybersecurity Maturity Model Certification (CMMC) program. This sought to combat threats and protect data with rules, training, and assessments. In March 2021, the DoD reviewed and refined CMMC…
Read MoreWhat is Proofpoint?
Criminals know the easiest way into your company is through its staff. They use many tactics to gain access to data and accounts. Email is the main attack vector targeting users with admin access. In fact, over 90% of attacks start with an email, according to a recent report from Verizon. Experts at Proofpoint know…
Read MoreInfoblox and DNS Security
Data breaches are common threats facing today’s companies. They occur for many reasons, from user error to bad actors. It’s crucial to protect systems from breaches to avoid lost data, clients, and revenue. Best practices go a long way in cutting breaches linked to human error. Although, key frameworks such as the Domain Name System…
Read MorePing Identity Custom IAM Solutions
Today’s businesses are adjusting to shifting models and expectations. Remote work and cloud applications both present great opportunities for growth, as well as challenges to security. The wrong decision in these instances can severely impact costs, risks, revenue, and complexity. Successful organizations employ automated systems which enhance their data protection, user control, and overall flexibility
Read More