OUR BLOG

Agentless Network Monitoring with Armis

By Caleb Kwong | Oct 31, 2022 |
three computer monitors

Almost every professional environment is now filled with interconnected devices. From corporate enterprises to the healthcare and manufacturing industries, many organizations now maintain their own internet of things (IoT). Such interconnection can reduce overhead and streamline processes, but it also opens up company networks to a wide range of new security risks. The truth is…

Read More

Legacy Systems and Security

By Caleb Kwong | Sep 28, 2022 |
server machines

It’s time to rethink the industry’s approach to cybersecurity. The conventional strategy of defending perimeters by guessing at threats is currently outmatched. Today’s attacks easily bypass yesterday’s security controls, and modern organizations now demand a deeper level of defense. The solution lies in automated, runtime protection rather than reactive detection and response. This novel approach…

Read More

Patch and Vulnerability Management with Tanium

By Caleb Kwong | Sep 13, 2022 |
top view of computer with lit up keyboard

Legacy endpoint security solutions are failing modern organizations. They were built to protect limited, on-site systems that rarely changed over time. However, today’s CIOs and their teams are expected to manage countless endpoints distributed across diverse network configurations. Each comes with its own set of vulnerabilities that must be monitored in real-time to ensure performance.…

Read More

Prisma Cloud from Palo Alto Networks

By Caleb Kwong | Jul 28, 2022 |
image of digital prism

Cloud-based applications are being created and deployed at such rapid rates that security teams often struggle to keep up. The need for an integrated cloud security solution is evident, and Palo Alto Networks has the answer. Its Prisma Cloud platform is the industry’s leading cloud-native security solution.

Read More

What is Application Security?

By Caleb Kwong | Jun 26, 2022 |
image of lock with digital chip

Mobile and web-based application security is a broad topic. It involves developing and testing features that prevent vulnerabilities from various attack vectors. Secure applications protect users and their data from being compromised by malicious actors. Here we take a moment to explore the topic of application security in detail. 

Read More

Arctic Wolf MDR

By Caleb Kwong | May 27, 2022 |
image of wolf howling at moon

Arctic Wolf’s cutting-edge managed detection and response (MDR) solution offers 24/7 real-time incident response and containment. We’re reviewing some of the main benefits of this system.

Read More

CMMC 2.0: A New Federal Standard

By Caleb Kwong | Apr 29, 2022 |
image of shield with lock

The US Department of Defense (DoD) knows cyber security is critical. DoD contractors are a major target of frequent, complex attacks. In 2020, the DoD started the Cybersecurity Maturity Model Certification (CMMC) program. This sought to combat threats and protect data with rules, training, and assessments. In March 2021, the DoD reviewed and refined CMMC…

Read More

What is Proofpoint?

By Caleb Kwong | Mar 29, 2022 |
image of cityscape with lock over it

Criminals know the easiest way into your company is through its staff. They use many tactics to gain access to data and accounts. Email is the main attack vector targeting users with admin access. In fact, over 90% of attacks start with an email, according to a recent report from Verizon. Experts at Proofpoint know…

Read More

Infoblox and DNS Security

By Caleb Kwong | Feb 28, 2022 |
image of person with hand on computer mouse

Data breaches are common threats facing today’s companies. They occur for many reasons, from user error to bad actors. It’s crucial to protect systems from breaches to avoid lost data, clients, and revenue. Best practices go a long way in cutting breaches linked to human error. Although, key frameworks such as the Domain Name System…

Read More

Ping Identity Custom IAM Solutions

By Caleb Kwong | Feb 10, 2022 |
tech image with "ping identity custom IAM solutions"

Today’s businesses are adjusting to shifting models and expectations. Remote work and cloud applications both present great opportunities for growth, as well as challenges to security. The wrong decision in these instances can severely impact costs, risks, revenue, and complexity. Successful organizations employ automated systems which enhance their data protection, user control, and overall flexibility

Read More