The Log4j lessons: so what IS vulnerability management anyway?

February 3, 2022|

We continue our Log4j blog series with the second installment: a deep dive into the subject of vulnerability management. What does it involve? What tools to use? And how to operationalize it into a long-term strategic cybersecurity approach.

The broken DMZ model

January 22, 2021|

The DMZ model can be found in the physical world, with the DMZ between North and South Korea being the most well-known. The idea of this DMZ is that it is neutral territory. Whenever there needs to be some sort of discussion impacting both parties, they meet in the DMZ. When network operators first started implementing the DMZ model, the idea was same.

Context is key: the data challenge of cybersecurity

January 22, 2021|

One of the biggest challenges within cybersecurity is how to handle the sheer amount of data. Everyone in the field is familiar with the stories of failed SIEM implementations, because the number of false positives is simply too big for the available IT staff to have enough time and manpower to separate the useful from the useless.

Network segmentation is not Zero Trust

January 4, 2021|

The terms network segmentation and Zero Trust are used more and more and have turned into real buzzwords. We are asked more and more often whether or not we can segment the network. What is actually being asked is, can we help set up a Zero Trust environment.