Blogs

Blog Image

Secure the Cloud—All Hands on Deck

The cloud is storming. There has been intense surge of cloud adoption in businesses throughout every vertical over the past year, but I believe this astonishing trend is only the beginning. I feel that a massive, measured adoption of the cloud will continue, but—perhaps even more shockingly—without the security planning, controls, tools, and skillsets that would be considered standard when protecting a traditional technology infrastructure.

Blog Image

Women in Cybersecurity: Katy Lietzau

Katy Lietzau, Director of Channel for the Central Region at CRITICALSTART, believes in the power of a good conversation within the partner community.

Blog Image

MOBILESOC: You’ll Take this Threat Alert to Go.

Smoked brisket, poached eggs, sliced tomatoes, and sourdough toast—it’s the brunch you’ve been waiting for all week. It’s weekend perfection…right up to the moment when you’re notified that your business — the one you’re charged to protect — is under cyber-attack.

At this point, your day can take one of two directions.

Blog Image

Zero-day Targeting Exchange Servers: Steps to Evaluate the Risk to Your Organization

By: Charlie Smith & Travis Farral

A zero-day has been announced targeting Exchange Servers. If you are running on-premises Exchange Servers within your environment, public facing or in a hybrid configuration, stop what you are doing, finish reading this article, and patch your Exchange Servers immediately! 

Blog Image

The Top Three Issues Robbing You Of SIEM ROI

Upon inception, the function of the Security Information and Event Management (SIEM) was to aggregate log data collected from a variety of sources across an organization. With the data centralized, the next generation of the SIEM leveraged detection logic, or rules, to generate alerts under given conditions.

Blog Image

Earning Your Business is Good. Earning Your Trust is Better.

The impact a company culture has on delivering value 

Company culture might feel like a touchy-feely, softer side of a business. Not necessarily something that business leaders would prioritize with regards to competitive advantage or gross margin. However, as a CEO, I have come to find that the most important decisions I make are around the type of culture we have in the company, how we compete, and how we win.  

Blog Image

Formidable Style

{"theme_css":"ui-lightness","theme_name":"UI Lightness","center_form":"","form_width":"100%","form_align":"left","direction":"ltr","fieldset":"0px","fieldset_color":"000000","fieldset_padding":"0 0 15px 0","fieldset_bg_color":"","title_size":"40px","title_color":"444444","title_margin_top":"10px","title_margin_bottom":"60px","form_desc_size":"14px","form_desc_color":"666666","form_desc_margin_top":"10px","form_desc_margin_bottom":"25px","form_desc_padding":"0px","font":"\"Lucida Grande\",\"Lucida Sans Unicode\",Tahoma,sans-serif","font_size":"15px","label_color":"3f4b5b","weight":"normal","pos
Blog Image

Navigate Aftermath of SolarWinds Attack With On-Demand Resources

The SolarWinds cybersecurity breach, also known as Sunburst, has made global headlines for its duration, impact, and high-profile targets. After going undetected for months, the news in December 2020 of the nation–state attack was the holiday surprise no one wanted. 

CRITICALSTART takes a closer look at the SolarWinds breach through two January information sessions, both available on demand: 

Blog Image

Data Privacy Program from Zero to Hero

As I promised last week, here’s a short article on Developing and Implementing a Data Privacy Program. I hope you will like it and share it with your teams and colleagues. 

Blog Image

Windows Security Event Logs – What to Monitor?

The following is a table of event codes that I’ve found to be extremely valuable to log and monitor in an environment. Some trend more towards general environment health and activity monitoring, however they all have a foothold in security value as well. As always, your environment’s needs and requirements will be different depending on a multitude of other factors such as compliance and log retention, and these should be taken into consideration when choosing what to log – and for how long.

Blog Image

How To Reverse Engineer the SolarWinds Hack

Author: Quentin Rhoads-Herrera, Director of Professional Services