Defense in Depth

Defense in Depth

Defense-in-Depth.  It’s time to revisit an old but tried and true model. Here at WTG we’ve been spending a fair amount of time investigating the landscape that is cyber liability insurance, cyber litigation, breach, and loss.  In looking at that landscape, we’ve been reminded of why our NIST CSF / Defense-in-Depth based approach to helping […]

Read More »
Endpoint and Network Security Operations

Endpoint and Network Security Operations

  Let’s talk about endpoint protection strategy and its relation to security operations (SIEM+SOC or MSSP/MDR). While there is sometimes overlap in parts of these technologies, both endpoint and security operations are important. They both play a distinct role in an effective security program. Network sensors “see” activity that endpoints don’t. Endpoint agents are closest to process […]

Read More »
VDI: High CPU Got You Down?

VDI: High CPU Got You Down?

  (TL;DR = scroll down to “Conclusion / The ‘Fix’”) Fortunately, I have the opportunity to see many environments “in-the-wild”, as it were. The downside is running into those annoying conditions where something is obviously wrong (or not operating as expected), without an obvious cause. Over the last year or so, I’ve come across this […]

Read More »