Biggest Cybersecurity Risks to Manufacturing in 2019

The cybersecurity threat landscape keeps changing. Every day there are new threats, exploits, and reports of breaches. If one thing has stayed the same it’s that the threat is real and it’s knocking on the door of corporate networks and seeing what can be...

What Does a Cybersecurity Analyst Do

  What Does a Cybersecurity Analyst Do?  For more than twenty years, I have been working as a cybersecurity Minnesota consultant in the ever-changing world of technology. Most people have some understanding of the need for cybersecurity. It is rare that much...

How to Use Metrics in Cybersecurity

“What gets measured gets managed,” the famous words from Peter Drucker. I’ve tried many ways of putting metrics around security initiatives. Some have been successful, some have been a failure, the worst have added confusion. Reporting cybersecurity...

What is Prescriptive Security – Cybersecurity

I’ve wasted so much money at the doctor’s office. It’s deeply influenced the way I look at ‘going to the doctor’. I’ll be that guy that should’ve gone in a lot earlier, but now I”m stuck with some horrible prognosis...

What is Log Management – Minnesota Cybersecurity

  In the wonderful world of cybersecurity, one of the favorite tools to use to detect malicious attempts to breach and compromised data is a tool we call SIEM. SIEM: Security Information and Event Management Not only can it help us detect events when it’s...

Minnesota Cybersecurity Endpoint Strategy

We have a tendency in cybersecurity to make everything a big deal. As a cybersecurity advisor, I try not to be that person that is yelling, “the sky is falling and the world is coming to an end”. But, if I had to pick only three ‘big deals’ it...