(402) 261-0123

Archives

Learn more news

Archives for Category: Technical

Cylance vs. Malware Posing as a Sneaky Flash Installer

Written By: Derrick Masters, Security Engineer Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. "Oh crap. What'd they hit? Where's it going? What IS this?!" Unless you have Cylance. Recently, we noticed such a hit with one of our customers in the financial world. We received an alarm out of our SIE...

Ten Cybersecurity Tips and Tools for Professionals in the Industry

Written By: Michael Wisthoff, Information Security Analyst Surviving as a professional in the cybersecurity realm is no easy task, but the need for more of us is ever increasing. Below are some tips and tools that you might find useful if cybersecurity has been entrusted to you.

10 Tips & Tools You Should Be Using

Password Manager - KeePass

With the need for more...

CylancePROTECT vs. RansomFree: Do You Get What You Pay For?

Written By: Derrick Masters, Security Engineer As an all-around nerd, not just a security nerd, I spend a lot of time checking out non security related blogs that involve a lot of technology. One in particular is Lifehacker.com. They usually have some pretty interesting blurbs about software or attacking a problem in a different way. Nothing too heavy, but still useful. The other day, though...

That’s No Moon… It’s Malware

Written By: Derrick Masters, Security Engineer Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. "Oh crap. What'd they hit? Where's it going? What IS this?!" Recently, we noticed such a hit with one of our customers in the financial world. We received an alarm out of our SIEM that Cylance had quaran...

4 Threat Assessment Best Practices

Cyberattacks have become commonplace across a variety of verticals —from big box stores to toymakers and even the federal government. Security staffers are feeling the pressure to ensure their company isn’t the next one splashed across the headlines. While the urge to lock everything down tight is understandable, the need for network security must be balanced intelligently with growth a...

Prepare for the Hunt – Five Practical Tips to Make Log Analysis Less Miserable with Fortinet

Written By: Derrick Masters, Security Engineer Log analysis. It's a thing. First reactions are probably going to be "Yuck," "Make the new guy do it," "Insert expletive here," or the more common "Why? What broke now?" Everyone in IT knows that logs are one of the single most important things in any environment. If something breaks, check the logs. Someone blaming the firewall for a site n...