Security

The “Specter” of a Meltdown

By Ron Temske, Vice President of Security Solutions, Logicalis US

At the start of the New Year, many of you read about two new cyber vulnerabilities – Meltdown and Spectre.  I want to spend a little time sharing my thoughts about these vulnerabilities and Vulnerability Management in general.  The focus here is not to repeat the numerous articles that have already been created on this topic but to share thoughts and opinions on the topic.  I will include links at the end of the article to some of the websites that I think provide particularly useful information on the topic.

Read more

IT and Security Teams Must Embrace Rapid Threat Containment

By Mike Johnson, Senior Cybersecurity Architect, Logicalis US

Most malware, phishing, exploits and ransomware threats are built to evade detection and response capabilities. This makes it a real challenge to build your defenses, contain the scope of the attacks and perform the appropriate fixes so you can get back to providing value to your business.

Read more

Cyber Defense Strategies: Basics to Bleeding Edge

By Mike Johnson, Senior Cybersecurity Architect, Logicalis US

When it comes to information security the basics are well documented. There are more Common Security Frameworks (CSF) than I can count on one hand and three of them have mass adoption (NIST, CIS, ISO27001). Implementing the controls within those CSF’s can keep even the most robust IT and Security teams busy for years. Still, they are your best guide to defense of your critical IT systems and data.

Read more

Is Managed Security the Answer to Surviving the Cybersecurity Talent Shortage?

By Ron Temske, Vice President, Security Solutions, Logicalis US

Most CIOs are well aware that there’s a significant shortage of cybersecurity professionals in the talent pool today. This becomes increasingly clear – and painful – for IT leaders within enterprise organizations as they are pressured from every side to bolster their companies’ security strategies and protect their digital assets.  A growing number of regulatory and compliance requirements coupled with demands from corporate boards of directors, shareholders and customers – particularly in the manufacturing and legal verticals where security questionnaires are being added as a requirement of doing business – is creating a demand for skilled, well-trained IT security specialists that simply cannot be filled.

Read more

Your Email is Out to Get Your Users – Part 1: How did this happen?

Part 1: How did this happen?

By Ron Temske, Vice President of Security Solutions, Logicalis US

Email is widely and increasingly used as an attack vector for malware. In fact, it has become one of the largest attack vectors and no organizational size is immune. Let’s look at the complexities of the challenge IT organizations face when it comes to email as an attack vector and some recommendations for mitigating this threat in your organization.

Read more

Page 1 of 1712345...10...Last »