SecOps Archive

Containing the Cost of the Cloud

We’ve got clients in all stages of cloud adoption, from the nascent migrators to the “we’re all ins.” Each stage of the journey has its own challenges, and our job is to engineer solutions for each client, at each stage. The final stage in the cloud journey (if there...

Meltdown and Spectre Vulnerabilities—and How to Spot Them

Understand the critical aspects of Meltdown and Spectre vulnerabilities and how to protect your systems. Meltdown allows access to other programs’ memory, while Spectre tricks programs into leaking data. These vulnerabilities can be detected and mitigated with current endpoint protections like Cybereason or Cylance. Join our session to learn about deploying patches, utilizing web proxies, firewalls, and ensuring your systems are secure. Ideal for IT professionals seeking to enhance their security posture against these threats.

Cybersecurity and the “Human Factor”

A very large percentage of security breaches are caused by human error. HUMANS are the weakest security link in today’s technology infrastructure. That said (and perhaps ironically), best security practices require continual human examination and intervention, even...