by Tony Asher | Jul 16, 2019 | Blogs
Do you want help with your security information and event management solution (SIEM)? We’ve been working on SIEM solutions for years and if I can be totally transparent, it’s difficult. To implement and tune a SIEM so that it provides risk reduction, low...
by Tony Asher | Jul 16, 2019 | Blogs
Welcome back as we continue our journey to secure applications from their birth to their deployment through Git repos, Docker containers, Kubernetes orchestration, and live in the Google Cloud Platform. In the previous article, we covered the foundation for security....
by Tony Asher | Jul 15, 2019 | Blogs
The most underutilized cybersecurity tool is the Security Information and Event Management (SIEM) system. I’ve never seen any other vendor solution be purchased as much, and left so underutilized. To that point, I’ve never even seen a SIEM being used to...
by Tony Asher | Jul 12, 2019 | Blogs
Are you looking for a cybersecurity advisor in Minnesota to partner with you on security initiatives? Our goal is to help Minnesota businesses lower their risk and decrease their costs by partnering with them to mature their cybersecurity programs. This is...
by Tony Asher | Jul 10, 2019 | Blogs
Are you responsible for the security of application containers running in the cloud? If so, you’ve found the right source to help you secure it. In this series of securing developed applications hosted in the cloud. We’ll walk through where the code starts...
by Tony Asher | Jul 4, 2019 | Blogs
We’ve moved from hub and spoke network technologies, to servers, to virtualization, to cloud, and now we are graduating to container technologies using Docker and Kubernetes. With this new evolution in technology brings new security review...
Recent Comments