BLOG
Minnesota Security Information and Event Management (SIEM)
The most underutilized cybersecurity tool is the Security Information and Event Management (SIEM) system. I've never seen any other vendor solution be purchased as much, and left so underutilized. To that point, I've never even seen a SIEM being used to the...

Minnesota Cybersecurity Advisor
Are you looking for a cybersecurity advisor in Minnesota to partner with you on security initiatives? Our goal is to help Minnesota businesses lower their risk and decrease their costs by partnering with them to mature their cybersecurity programs. This is...
Securing Cloud Applications – Part 1: Developer Foundations
Are you responsible for the security of application containers running in the cloud? If so, you've found the right source to help you secure it. In this series of securing developed applications hosted in the cloud. We'll walk through where the code starts and follow...
Kubernetes & Container Security Consulting
We've moved from hub and spoke network technologies, to servers, to virtualization, to cloud, and now we are graduating to container technologies using Docker and Kubernetes. With this new evolution in technology brings new security review philosophies and...
What Does a vCISO do?
If you want an information and cyber security leader, but don't' want to afford or be burdened by a full-time employee, a virtual CISO can be a great solution. But without the leadership of a CISO, how do you know what the vCISO should do? It's important to note...
How Much Does a vCISO Cost?
You're in charge of protecting the company's assets and reputation. You have critical and sensitive information and you have regulation requirements you need to attest to and meet. You need someone that can manage this responsibility and lower risk without impacting...
Overlooked Benefits of Hiring a vCISO
The role of a CISO is critical within a business that has significant risk and needs to implement and maintain an operational security program. But hiring this role is expensive, and it can be hard to qualify and identify the right candidate. A...
Minnesota Cybersecurity Companies
Minnesota is a hotbed of cybersecurity talent. To access that amazing talent, you should partner with a local cybersecurity company. If you're looking to for cybersecurity help with advisory services, consulting, or initiatives and want to support local...

When to Pen Test an Application?
Cybersecurity article on when to decide to test your application by means of a professional penetration test.
How to Build a Computer Security Incident Response Plan
A Security incident handling and response plan is a premeditated plan on how you will determine, classify, and respond in an organized and prepared manner to a cyber attack that potentially impacts the business. Your goal is to reduce the impact of the incident...