Security

  • IPv6 Geolocation: Challenges and Solutions

    Scott Hogg  |  November 8, 2017
    Human nature makes us curious to know where we are located within the World Wide Web.  We are also curious about where within the global Internet the person we are communicating is connected.  We could use this information to make security... Read more
  • Pinpoint Solution vs. Platform: Which is Best For Your Company’s Security?

    Jon Link  |  December 19, 2016
    What does your company’s security solution set look like? Does it look like this? The traditional view of security is often fragmented by using a single solution approach for each security control. Multiple vendors with varying... Read more
  • 2017 Technology Predictions: Networking and Security

    Scott Hogg  |  December 9, 2016
    It seems that every year holiday decorations appear in the store earlier than the year before. I’ve noticed the same trend with prediction posts. I saw a few in early November this year; I imagine next year we might see some as a precursor... Read more
  • AWS re:Invent re:Emphasizes the Importance of Cloud Security

    Scott Hogg  |  December 5, 2016
    Importance of Security to AWS and Its Customers It may be obvious that there is a heightened importance of security when operating in a public cloud. Amazon Web Services (AWS) has made it clear that security is one of their top... Read more
  • The Smart Home Security Concern You Haven’t Considered

    Scott Hogg  |  November 18, 2016
    Last year, Gartner predicted that consumers were on track to activate 5.5 million Internet of Things (IoT) devices per day. Along with smartphones, smart watches and smart cars, we now have the ability to employ “smart home” devices that... Read more
  • GTRI Partner, Wombat Security Technologies, Named Leader in Gartner Magic Quadrant

    Greg Byles  |  November 2, 2016
    Earlier this year, GTRI partnered with Wombat Security Technologies, to provide our clients with cyber security awareness training that helps employees avoid phishing scams and other security risks. We believe that Wombat’s knowledge... Read more
  • Expanding Insider Threat Security with Employee Training and Awareness

    Mike Vinton  |  September 2, 2016
    When you think of “insider threats,” what comes to mind? Perhaps a disgruntled employee looking to hurt the organization or someone selling company secrets. But not all insider threats have malicious intent. Human error is certainly a... Read more
  • Addressing the Cisco ASA SNMP Remote Code Execution Vulnerability

    Michael Edwards  |  August 31, 2016
    As you have probably seen, there has been much in the news lately about the EXTRABACON exploit released by a group of hackers called the Shadow Brokers, who supposedly acquired the exploit (and other cyber weapons) from a different group of... Read more
  • What’s in Your Email?

    Greg Byles  |  August 19, 2016
    Most of us wouldn’t want anyone snooping around our personal or company emails. Yet email security breaches are becoming more common. Consider these recent situations: Nearly 20,000 emails from the Democratic National Committee were... Read more
  • How not to Fall Victim to an Insider Threat

    Greg Byles  |  July 1, 2016
    One of the most daunting challenges facing any CIO today is the very real threat of a security hack that results in sensitive data getting into the wrong hands or disrupts business. All organizations – large or small, private or public –... Read more