BLOG
Minnesota Security Information and Event Management (SIEM)
The most underutilized cybersecurity tool is the Security Information and Event Management (SIEM) system. I've never seen any other vendor solution be purchased as much, and left so underutilized. To that point, I've never even seen a SIEM being used to the...
Minnesota Cybersecurity Advisor
Are you looking for a cybersecurity advisor in Minnesota to partner with you on security initiatives? Our goal is to help Minnesota businesses lower their risk and decrease their costs by partnering with them to mature their cybersecurity programs. This is...
Securing Cloud Applications – Part 1: Developer Foundations
Are you responsible for the security of application containers running in the cloud? If so, you've found the right source to help you secure it. In this series of securing developed applications hosted in the cloud. We'll walk through where the code starts and follow...
Kubernetes & Container Security Consulting
We've moved from hub and spoke network technologies, to servers, to virtualization, to cloud, and now we are graduating to container technologies using Docker and Kubernetes. With this new evolution in technology brings new security review philosophies and...
Minnesota Cybersecurity Companies
Minnesota is a hotbed of cybersecurity talent. To access that amazing talent, you should partner with a local cybersecurity company. If you're looking to for cybersecurity help with advisory services, consulting, or initiatives and want to support local...
When to Pen Test an Application?
Cybersecurity article on when to decide to test your application by means of a professional penetration test.
How to Build a Computer Security Incident Response Plan
A Security incident handling and response plan is a premeditated plan on how you will determine, classify, and respond in an organized and prepared manner to a cyber attack that potentially impacts the business. Your goal is to reduce the impact of the incident...
4 Questions to Prevent Passive Programmer Security
Do you development software or applications internally? Photo by Émile Perron on Unsplash Support for internally developed applications can allow speed to market, customization, and even a competitive advantage. Common problems are supportability, security, and...
Best Security Controls for the Endpoint
When we consider the volume of security incidents and breaches we can see a picture that a large volume of these is hitting the endpoint. The reason is twofold; 1. Where the weakest link is = the user. 2. Administrative Rights - That asset is typically logged in with...
What Does a Minnesota Cybersecurity Advisor Do?
What is a Minnesota cybersecurity advisor? A partner to come along aside you and your organization to help formulate the most right plan to lower risk and save money for your business. The threats are overwhelming. From access privilege escalation to cross-site...