Security Services

June 6, 2018

SECURITY

The Importance of Logs

3 min read

It's funny how the world turns. I started off in security working for a bank. The model there was very much build it, break it, fix it with our Operational...

The 3 Ps of Comprehensive Cybersecurity

3 min read

The threat of cybersecurity breaches is business impacting in our ever-increasing connected world. But technology alone is no panacea to the increasing scale and complexity of cybersecurity threats.

April 30, 2018

SECURITY

Top 5 Recommendations from Cisco Incident Response Engagements

5 min read

In the course of an emergency response, our Incident Response (IR) team constantly makes tactical and strategic recommendations according to customer and environment needs. Here are the 5 top recommendations.

April 26, 2018

SECURITY

Incident Response and General Data Protection Regulation

6 min read

This article will address provisions of the GDPR related to Incident Response (IR) planning. A proven IR plan will lend GDPR compliance and provide a framework for practical Incident Response.

April 12, 2018

SECURITY

Secure Data Centers: When the Best Advice is to Get the Best Advice

3 min read

We ask Brian Trevey and Saad Hasan, our resident Secure Data Center gurus, three simple questions on the design and implementation of security, data center and networking infrastructure solutions.

April 10, 2018

SECURITY

Leveraging Cloud Environments for Security and Speed

3 min read

The benefits and challenges of the new normal In the Pacific Northwest, the weather, especially in the spring, can be pretty variable. Just look at this tweet from the National Weather...

March 26, 2018

SECURITY

The Fast Pace of Change

4 min read

Rethinking Secure Technical Innovation to Enable Successful Business Outcomes Over the past 25 years I have been employed in the technology field, my non-technical friends often ask me, “How do...

March 14, 2018

CISCO SERVICES (CX)

NEW #CiscoChat Podcast: Think Your Business is Secure? Ask the Red Team

1 min read

A simulated red team attack helps identify areas for improvement and make crucial changes to security strategy.

March 8, 2018

SECURITY

Balancing Cybersecurity Program Priorities: It’s Time to Get Help

3 min read

The Project Management Triangle. The Iron Triangle.  The Triple Constraint. There are many names for the three-word phrases in the title of this blog, but it all comes down to...