Security

IT and Security Teams Must Embrace Rapid Threat Containment

By Mike Johnson, Senior Cybersecurity Architect, Logicalis US

Most malware, phishing, exploits and ransomware threats are built to evade detection and response capabilities. This makes it a real challenge to build your defenses, contain the scope of the attacks and perform the appropriate fixes so you can get back to providing value to your business.

Read more

Cyber Defense Strategies: Basics to Bleeding Edge

By Mike Johnson, Senior Cybersecurity Architect, Logicalis US

When it comes to information security the basics are well documented. There are more Common Security Frameworks (CSF) than I can count on one hand and three of them have mass adoption (NIST, CIS, ISO27001). Implementing the controls within those CSF’s can keep even the most robust IT and Security teams busy for years. Still, they are your best guide to defense of your critical IT systems and data.

Read more

Is Managed Security the Answer to Surviving the Cybersecurity Talent Shortage?

By Ron Temske, Vice President, Security Solutions, Logicalis US

Most CIOs are well aware that there’s a significant shortage of cybersecurity professionals in the talent pool today. This becomes increasingly clear – and painful – for IT leaders within enterprise organizations as they are pressured from every side to bolster their companies’ security strategies and protect their digital assets.  A growing number of regulatory and compliance requirements coupled with demands from corporate boards of directors, shareholders and customers – particularly in the manufacturing and legal verticals where security questionnaires are being added as a requirement of doing business – is creating a demand for skilled, well-trained IT security specialists that simply cannot be filled.

Read more

Your Email is Out to Get Your Users – Part 1: How did this happen?

Part 1: How did this happen?

By Ron Temske, Vice President of Security Solutions, Logicalis US

Email is widely and increasingly used as an attack vector for malware. In fact, it has become one of the largest attack vectors and no organizational size is immune. Let’s look at the complexities of the challenge IT organizations face when it comes to email as an attack vector and some recommendations for mitigating this threat in your organization.

Read more

It’s Time to Consider CIS Controls for Your Enterprise Security

By Ron Temske, Vice President of Security Solutions, Logicalis US

In previous blog articles, I’ve mentioned the Center for Internet Security (CIS), a nonprofit that harnesses the power of the global IT community to safeguard private and public organizations against cyber threats. We think very highly of their approach to cybersecurity, so much so in fact, that Logicalis recently became an Organizational Consulting Member of CIS because we recognize that its approach to security aligns very tightly with our own and supports our values. Here’s why we find CIS important and I think that you will as well.

Read more

Page 1 of 1712345...10...Last »