What Has The Internet Done?

12.13.2016 by Kelsey Marsh

I recently read an article, which got me thinking about security (which naturally, is always the first thing that comes to mind). [Read more...]

What I have learned in my first year of Cyber Security: Part Two- Projects & Programs

12.13.2016 by VioPoint Blogger

I hope everyone that had a chance to read my part one blog enjoyed it and gained a little extra knowledge. As I mentioned, part two is going to be focused on the difference between projects and programs. When I say projects and programs I want to ... [Read more...]

Defense in Depth Isn’t Dead You’re Just Doing it Wrong

12.05.2016 by VioPoint Blogger

Over the last six months or so I’ve a read a few articles concerning the demise of defense in depth. I’ve also conversed with a few of my peers at organizations where management seems to be forgoing defense in depth for a Hunter\Killer model of ... [Read more...]

Help Desk Coordinator versus Networking Monitoring

12.05.2016 by Anthony Micou

Transitioning from one job to another can be a nerve wracking experience, especially when combined with an introduction into unfamiliar territory. I had been working in IT for about five years. I’d worked my way through Level 1 phone support, onsite ... [Read more...]

Companies Struggling with Network Security Monitoring

12.05.2016 by Mike Pokas

Earlier this year a report released by the Ponemon Institute indicated that four out of five businesses lack the required infrastructure and/or security resources with the proper skills required to recognize and defend against incoming ... [Read more...]

Is Your Vulnerability Management Process Effective?

11.22.2016 by Mike Pokas

If your current vulnerability management process providing the value that is meaningful to your business?  A well implemented and effectively managed vulnerability management process can deliver significant value and return on your investment as a ... [Read more...]

Ransomware: Prevention Now Will Save Panic Later

11.22.2016 by Mike Pokas

Your organization has just made a startling discovery.  They have been the victim of a ransomware attack and are now facing the challenge of what to do about it.   Moreover, you discover that your backup files have been corrupted as well and will be ... [Read more...]

Cyber Payment Fraud: A Layered Security Approach

11.07.2016 by Mike Pokas

When it comes to preventing cyber payment fraud, traditional security controls are proving to be insufficient.  Cyber criminals are becoming more sophisticated.  Three decades ago, paper check fraud was our biggest concern.  However, as we have ... [Read more...]

What I have learned in my first year of Cyber Security: Part One

11.07.2016 by VioPoint Blogger

You know that saying everyone uses “drinking water from a fire hose?" Cyber Security is nothing like that! Before I joined VioPoint, I saw commercials on TV, where everyone is sitting in a huge SOC and some guy in the corner yells “we have a ... [Read more...]

Security Project Management - Benefits of Experience

10.28.2016 by Mike Pokas

Over the course of the last several years, I have been involved in the planning, development, implementation and assessment of cyber security strategies both internally and externally.  During one fairly recent client engagement of this type, we ... [Read more...]

Latest Blog Posts

Categories

see all