• Admins, Don’t “Default” on Your Security Obligations

    Scott Hogg  |  February 7, 2018
    Any network administrator worth his/her salt knows to change the default password on a router during its initial configuration, or you leave your network open to outside attack. Fortunately, these passwords are easy enough to change. But... Read more
  • IPv6 Geolocation: Challenges and Solutions

    Scott Hogg  |  November 8, 2017
    Human nature makes us curious to know where we are located within the World Wide Web.  We are also curious about where within the global Internet the person we are communicating is connected.  We could use this information to make security... Read more
  • Pinpoint Solution vs. Platform: Which is Best For Your Company’s Security?

    Jon Link  |  December 19, 2016
    What does your company’s security solution set look like? Does it look like this? The traditional view of security is often fragmented by using a single solution approach for each security control. Multiple vendors with varying... Read more
  • 2017 Technology Predictions: Networking and Security

    Scott Hogg  |  December 9, 2016
    It seems that every year holiday decorations appear in the store earlier than the year before. I’ve noticed the same trend with prediction posts. I saw a few in early November this year; I imagine next year we might see some as a precursor... Read more
  • AWS re:Invent re:Emphasizes the Importance of Cloud Security

    Scott Hogg  |  December 5, 2016
    Importance of Security to AWS and Its Customers It may be obvious that there is a heightened importance of security when operating in a public cloud. Amazon Web Services (AWS) has made it clear that security is one of their top... Read more
  • The Smart Home Security Concern You Haven’t Considered

    Scott Hogg  |  November 18, 2016
    Last year, Gartner predicted that consumers were on track to activate 5.5 million Internet of Things (IoT) devices per day. Along with smartphones, smart watches and smart cars, we now have the ability to employ “smart home” devices that... Read more
  • GTRI Partner, Wombat Security Technologies, Named Leader in Gartner Magic Quadrant

    Greg Byles  |  November 2, 2016
    Earlier this year, GTRI partnered with Wombat Security Technologies, to provide our clients with cyber security awareness training that helps employees avoid phishing scams and other security risks. We believe that Wombat’s knowledge... Read more
  • Expanding Insider Threat Security with Employee Training and Awareness

    Mike Vinton  |  September 2, 2016
    When you think of “insider threats,” what comes to mind? Perhaps a disgruntled employee looking to hurt the organization or someone selling company secrets. But not all insider threats have malicious intent. Human error is certainly a... Read more
  • Addressing the Cisco ASA SNMP Remote Code Execution Vulnerability

    Michael Edwards  |  August 31, 2016
    As you have probably seen, there has been much in the news lately about the EXTRABACON exploit released by a group of hackers called the Shadow Brokers, who supposedly acquired the exploit (and other cyber weapons) from a different group of... Read more
  • What’s in Your Email?

    Greg Byles  |  August 19, 2016
    Most of us wouldn’t want anyone snooping around our personal or company emails. Yet email security breaches are becoming more common. Consider these recent situations: Nearly 20,000 emails from the Democratic National Committee were... Read more