by | Sep 30, 2020 | Network Security, Security
The phone rings. You answer it and the rattled voice on the other end says, “We think there has been a breach.” What is your first thought about what to do?A recent joint advisory issued by Australia, Canada, New Zealand, the United Kingdom and the United States...
by | Sep 16, 2020 | Network Security, Security
Mesh VPN software definitionMesh VPNs use a peer-to-peer architecture where every node or peer in the network can connect directly to any other peer without going through a central concentrator or gateway. This approach can be less expensive and easier to scale than a...
by | Sep 14, 2020 | Network Security, Security
For a growing number of companies, the “edge” of the enterprise network is an increasing focal point of IT investments. This is where they are aiming to bolster data storage, processing, and analytics capabilities to generate business insights from data gathered from...
by | Sep 2, 2020 | Network Security, Security
After a compromise, the first thing investigators will do is review the log files. The default logging on Windows machines, however, does not capture enough information to identify forensic artifacts. You can adjust your logging settings to get enough information to...