While the name might sound better suited to the construction industry, blockchain is an ever-expanding chain of digital transactions in which each additional block of records contains an encoded stamp (“hash”) of the preceding chain.
Is someone listening in on your calls?
If you’re a US federal government employee, this might be a well-founded concern. (If not… hopefully you’re just paranoid!)
With Russia manipulating US elections on social media, and Cuba somehow sickening our embassy staffers, it’s enough to make any American wary. All told, soft attacks on the US are on the rise. And phone lines are no exception.
Is your agency spearheading IT initiatives with a limited budget and aging infrastructure dating back 10, 20 or even 50+ years?
Topics: Infrastructure Optimization
In his inaugural blog post, Jeskell's new Vice President of Strategic Initiatives Tony Celeste opines on FITARA, the MGT Act, and more.
Topics: Infrastructure Optimization
Sometimes when you go to Las Vegas, you actually come home a winner. Jeskell attended the Dell EMC World user forum last month in Las Vegas to explore what our expanded relationship means to you, our valued customers. We think you’ll like what we brought back.
A New Partnership - Jeskell and Dell
The atmosphere at Dell EMC World was electric. More than 13,000 users and partners gathered to explore the recent Dell EMC convergence. The quantity and intensity of learning experiences was like drinking from a fire hose. And founder Michael Dell seemed to be everywhere, whether sitting next to a Jeskell team member at a luncheon, or making himself available at training sessions. Plus, we got up-close exposure to emerging technologies and new customer support offerings.
Every security initiative comes with a different set of tools, costs, and benefits. Some tools are relatively easy to implement and bring a straightforward cost benefit analysis. IPS devices and endpoint management tools, which still take some planning, are relatively easy to incorporate. Other tools, however, while simple to install, take time to plan for, configure, and populate. SIEM systems need to be integrated with other security tools and populated with log and flow sources. They need to be tuned for efficiency and relevance. But even those tools have a straightforward integration plan.
Often times, we tend to think of security as an external concern. We have infrastructure like servers and storage, networks for our communication, and a team for developing our applications. Oh, and security, that goes on top. That’s not to say that this approach won’t work. It will cover many of the security threats. But will it cover as many security threats as possible and will it do so in a way that supports your business processes?
One of the most common gaps our engineers encounter is post-installation neglect. Think of the number of security devices in any given network – IPS, firewall, encryption devices, aggregators, SIEM, patch management, malware, access management - to name but a few. Each one of these gets attention during installation, but then too often languishes, forgotten, unless something breaks.
As threats increase and organizations rely more heavily on IT infrastructure, even a Security Information Event Manager (SIEM) may not be enough. While a SIEM can tell you what’s happening, it can’t control responses. Every organization is different, but many mature organizations still use manual processes in order to respond to and remediate incidents.
Continuing in the theme of last week's post on cyber security (read that post here), we will be running a security "blitz" this week. Jeskell security expert Joey Swartz will review the "Top 5 Security Integration Gaps," from Common Operating Picture to Network Design, and more. The purpose of this series is to give you relevant, timely information to help modernize your organization's IT security practices.