The term “security program” means a lot of different things to a log of different people. To some, it’s just an acceptable use policy or password policy. To others, it’s…
read moreDefensive Strategies: The Power of Visibility When: OnDemand About the Webinar: Security programs are struggling with noise. What is legitimate and what is suspicious? Attackers use that to their advantage…
read moreIntro One of the aspects of defending enterprises that humbles me the most is scale. Enabling different logging and sending those logs to some kind of centralized SIEM device sounds…
read moreWelcome to the Lares Credit Union Solutions Credit Union Morning Coffee informative video for the week of July 6, 2020. This video provides Credit Union executives, IT staff, and security…
read moreWelcome to the Lares Credit Union Solutions Credit Union Morning Coffee informative video for the week of June 29, 2020. This video provides Credit Union executives, IT staff, and security…
read moreLares CEO Chris Nickerson was recently interviewed by Karen Bankston for a recent Credit Union Executives Society (CUES) CU Management article on the topic of keeping pace with evolving fraud…
read moreThe Gathering of the Vulnerability Wranglers 2.0 (VW 2.0) panel debuts today on InfoSecWorld’s 2020 Digital event. As a content leadership advisor for InfoSecWorld USA, I have had the pleasure of hosting and moderating the…
read moreWelcome to the Lares Credit Union Solutions Credit Union Morning Coffee informative video for the week of June 22, 2020. This video provides Credit Union executives, IT staff, and security…
read moreWelcome to the Lares Credit Union Solutions Credit Union Morning Coffee informative video for the week of June 15, 2020. This video provides Credit Union executives, IT staff, and security…
read moreBackground It’s important I point out upfront that nothing I am demonstrating I can take credit for. Evidence of this used in the wild was talked about as mentioned here…
read more