BLOG
Cybersecurity Metrics: Purpose Drives Measurements
Measuring your information and cybersecurity program can be difficult. But when a metrics program is developed using the right measurements from the right sources, it can provide incredible value insights into your program, reveal weak areas, market your strengths,...
MN Cybersecurity Metrics: Secret Sauce, Assets, Users, and Locations
How can you measure the success and opportunities of a cybersecurity program? With so many risks, threats, vulnerabilities, and exploits in the wild it's difficult for security leaders to clearly articulate what they are focused on, and why they are focused on...
SIEM vs Threat Intel
Security Information and event management and the crossroads with threat intelligence program. https://youtu.be/Nuk7Nqbtytk Threat Intel vs . Threat Data When I meet with a client that wants to build a threat intelligence program we sometimes you have to backward...
Table Topping Security Threats
Another company is in the news. Citibank has had a major breach of customer data. Articles are pouring in from quarterback security professionals pointing out the companies mistakes and cybersecurity failures. Personal Experience In Minnesota, one of...
Cloud Security – How to Build a Solid Cyber Strategy (MN)
Are you concerned with moving your data to the cloud? Are your partners and vendors starting to host your solution on SaaS or PaaS model and you want to develop your security review process? Problem I get it. I was in that position when I learned, only when I...
Minnesota Cybersecurity Speaker
Are you looking for someone to speak on cybersecurity? Hi, my name is Tony Asher and I speak on cybersecurity. I can speak on the various topics of information security and cybersecurity, including all the niches and pillars that make up a security...
Minnesota (MN) Cloud Security Consultant
What is a Cloud Security Consultant? A technology professional that understands computer security and can provide best practice guidance on how applications should be developed and hosted in the cloud. I think that's the shortest definition I can come up with. ...
Minnesota Information Security (InfoSec) Consultant
You've got sensitive or confidential data you want protected and you need to be sure it gets done right. From information security (InfoSec) policies to secure data destruction, we help local Minnesota businesses reduce their risk by helping you develop and...
Minnesota SIEM Consultant
Do you want help with your security information and event management solution (SIEM)? We've been working on SIEM solutions for years and if I can be totally transparent, it's difficult. To implement and tune a SIEM so that it provides risk reduction, low false...
Securing Cloud Applications – Part 2: Development Languages & Libraries
Welcome back as we continue our journey to secure applications from their birth to their deployment through Git repos, Docker containers, Kubernetes orchestration, and live in the Google Cloud Platform. In the previous article, we covered the foundation for security....