On Bringing the IT Managed Services Philosophy to Facilities Management and Services

Learn how IT managed services improve facilities management and elevate service delivery in our interview with Intelli-Systems CEO Joseph Vijay. Continue reading On Bringing the IT Managed Services Philosophy to Facilities Management and Services

Measuring the Impact of a Security Awareness Program

Our goal in building a security awareness program is to embed security into our partners’ existing organizational culture. Impacting culture is a long-term process that can take years and requires executive support. If you are tasked with managing a security awareness program, it is your job to measure and show leadership that your program is…

The post Measuring the Impact of a Security Awareness Program appeared first on TrustedSec.

Continue reading Measuring the Impact of a Security Awareness Program

Working with data in JSON format

What is JSON? What is JSON? JSON is an acronym for JavaScript Object Notation. For years it has been in use as a common serialization format for APIs across the web. It also has gained favor as a format for logging (particularly for use in structured logging). Now, it has become even more common for…

The post Working with data in JSON format appeared first on TrustedSec.

Continue reading Working with data in JSON format

The Crucial Role of Data Center Resiliency in Business Security

For many organizations, data center operations are handled by the facilities team or a third-party vendor. Although these functions aren’t part of the everyday responsibilities of the IT or Security departments, they are crucial to systems availability and to the ongoing operations of the business. Having a full understanding of the capacity and capabilities of…

The post The Crucial Role of Data Center Resiliency in Business Security appeared first on TrustedSec.

Continue reading The Crucial Role of Data Center Resiliency in Business Security

Maturity, Effectiveness, and Risk – Security Program Building and Business Resilience

One of the most common questions asked by business leadership is also one of the most challenging to answer: “How secure are we?” Now, some of you reading this may already be cringing or yelling at your screen that this question on its own shouldn’t have a simple answer with little actionable value. However, when…

The post Maturity, Effectiveness, and Risk – Security Program Building and Business Resilience appeared first on TrustedSec.

Continue reading Maturity, Effectiveness, and Risk – Security Program Building and Business Resilience

Frontline Managed Services’ Kyle Campbell on DFIR & E-Discovery Skills & Pathways

Christa: Electronic discovery, or e-discovery, has always required some digital forensic skills as litigators prepare to present electronic data at trial. However, as technology evolves, likewise, the skills needed to identify, collect and anal… Continue reading Frontline Managed Services’ Kyle Campbell on DFIR & E-Discovery Skills & Pathways

Barracuda Networks Acquires SKOUT Cybersecurity

Barracuda Networks this week extended the scope of its cybersecurity portfolio by agreeing to acquire SKOUT Cybersecurity. SKOUT’s security operations center (SOC) service and extended detection and response (XDR) software is primarily made avai… Continue reading Barracuda Networks Acquires SKOUT Cybersecurity

Can Managed Security Keep Businesses Safer?

In the last two decades, the cybersecurity industry has grown from a niche sector into a dominant force in the business world. Today, Gartner predicts that cybersecurity spending will reach $150 billion this year, almost double what was predicted in 2… Continue reading Can Managed Security Keep Businesses Safer?

EOs, Ransomware, and Critical Infrastructure: Q&A with Ryan Weeks

The Ransomware Task Force (RTF) was originally announced in December 2020 as a broad coalition of more than 60 experts in the cybersecurity industry, government, law enforcement and international organizations coming together in the fight against rans… Continue reading EOs, Ransomware, and Critical Infrastructure: Q&A with Ryan Weeks