BLOG
Minnesota (MN) Cloud Security Consultant
What is a Cloud Security Consultant? A technology professional that understands computer security and can provide best practice guidance on how applications should be developed and hosted in the cloud. I think that's the shortest definition I can come up with. ...
Minnesota Information Security (InfoSec) Consultant
You've got sensitive or confidential data you want protected and you need to be sure it gets done right. From information security (InfoSec) policies to secure data destruction, we help local Minnesota businesses reduce their risk by helping you develop and...
Minnesota SIEM Consultant
Do you want help with your security information and event management solution (SIEM)? We've been working on SIEM solutions for years and if I can be totally transparent, it's difficult. To implement and tune a SIEM so that it provides risk reduction, low false...
Securing Cloud Applications – Part 2: Development Languages & Libraries
Welcome back as we continue our journey to secure applications from their birth to their deployment through Git repos, Docker containers, Kubernetes orchestration, and live in the Google Cloud Platform. In the previous article, we covered the foundation for security....
Minnesota Security Information and Event Management (SIEM)
The most underutilized cybersecurity tool is the Security Information and Event Management (SIEM) system. I've never seen any other vendor solution be purchased as much, and left so underutilized. To that point, I've never even seen a SIEM being used to the...
Minnesota Cybersecurity Advisor
Are you looking for a cybersecurity advisor in Minnesota to partner with you on security initiatives? Our goal is to help Minnesota businesses lower their risk and decrease their costs by partnering with them to mature their cybersecurity programs. This is...
Securing Cloud Applications – Part 1: Developer Foundations
Are you responsible for the security of application containers running in the cloud? If so, you've found the right source to help you secure it. In this series of securing developed applications hosted in the cloud. We'll walk through where the code starts and follow...
Kubernetes & Container Security Consulting
We've moved from hub and spoke network technologies, to servers, to virtualization, to cloud, and now we are graduating to container technologies using Docker and Kubernetes. With this new evolution in technology brings new security review philosophies and...
What Does a vCISO do?
If you want an information and cyber security leader, but don't' want to afford or be burdened by a full-time employee, a virtual CISO can be a great solution. But without the leadership of a CISO, how do you know what the vCISO should do? It's important to note...
How Much Does a vCISO Cost?
You're in charge of protecting the company's assets and reputation. You have critical and sensitive information and you have regulation requirements you need to attest to and meet. You need someone that can manage this responsibility and lower risk without impacting...