Warning: The magic method MchGdbcBasePublicPlugin::__wakeup() must have public visibility in /home2/tectonic/public_html/www.abrahamsconsulting.com/blog/wp-content/plugins/goodbye-captcha/includes/plugin/MchGdbcBasePublicPlugin.php on line 44
Network Security Archives - TechTonic Times

TechTonic Times

Security I Networking I Storage I IT Staffing I Managed Services

Network Security Orchestration: Does Your NAC measure up?

Network Security Orchestration and its impact on your network. You may not be a fan of the Opera  and care very little for the Symphony,  yet, I am confident, that your humanity appreciates all that is beauty.  Network Security Orchestration delivers on one type of beauty. "Beauty is subjective." Sometimes. But a good night's sleep is always beautiful; harmonious relationships while you sleep,  even more.   Shouldn't your Network...

3 Network Access Control objections: a.k.a ‘alternative facts.’

I have heard my share of Network Access Control objections (NAC), but these three (3) have a following; a movement of sorts: "We have a firewall-so we don't need to worry about NAC." "Our wireless controller already has a built-in system like this." "We already use Mobile Device Management  (MDM) to ensure security of our devices." There is nothing better than a movement for a worthy cause. Consider the Women's march in DC on January 21, 1017?...

Network Access Control And Your University

3 Features to Look for When Evaluating Network Access Control  (NAC) for Your University You take great measures to ensure the safety of your university's students. You probably hired a team of security guards to patrol the campus and scheduled regular fire drills for residence halls. Despite your best efforts, you may be overlooking one of the biggest threats to campus safety; Hackers. Universities hold massive databases of sensitive...

Lateral Movement in Your Network. Can you tell?

By  Keith Wilson   One of the most damaging assumptions an organization can make is to assume an attacker’s end goal is to compromise a network. The majority of threat actors are after your data, not just circumventing firewalls and access controls. If they gain access to your network but get found out before they can steal anything, the attack was most likely considered a failure. To assume you have lost the moment an attacker gains...

StealthWatch: Fight Data Leakage

Written By Keith Wilson Traditionally, the climax to a story ends with the hero saving the day. I will save you the anticipation by telling you now that this is not the case with this tale. If you are looking for a happy ending for our large retail company who has fallen victim, I can assure you that in the following paragraphs, it does not happen.   In part one of this series, we discussed the first step of the cyber kill chain,...