<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog listing page

Pros and Cons of SSL Encryption

People familiar with Hypertext Transfer Protocol Security (HTTPS) know it protects online activities and communications by applying Secure Sockets Layer (SSL) encryption to web traffic. This is a benefit to organizations that need to shield private data from exposure. And what organization doesn’t?

Posted on January 18, 2017

Top 5 Cybersecurity Predictions for 2017

It’s no secret that 2016 was a rough year in terms of cybersecurity attacks. We saw big name breaches at the IRS, Verizon, the DNC, LinkedIn, and who could forget- Yahoo!

But while those breaches are top-of-mind and easy to remember, it’s important to also remember the impact hackers had on small businesses this year. 

Posted on January 02, 2017

To Respond or Not To Respond? Six Phases of Incident Response

“Hmm, that’s strange.”

In the scientific community, these words are thought of as the immediate precursor to the ‘Eureka’ moment when something amazing is discovered. In the information technology field, specifically in security, they usually mean something bad is happening.

Posted on December 13, 2016

That's No Moon... It's Malware

Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. “Oh crap. What’d they hit? Where’s it going? What IS this?!”

Recently, we noticed such a hit with one of our customers in the financial world. 

Posted on September 01, 2016

Drinking from the SANS Fire Hose: The Finest Cybersecurity Instruction

The SANS Institute is a cooperative research and education organization that reaches more than 165,000 security professionals around the world. Their programs undergo constant scrutiny and revision to ensure that the content is both on point and represents the state of the information security landscape as it stands today. 

Posted on April 28, 2016

Tagged Technical

Privileged Accounts: Catch-22 for Network Security

Privileged accounts represent one of the largest vulnerabilities an organization faces today in network security. It doesn’t matter if the accounts are compromised by an external attacker or a malicious insider. If privileged accounts are in the hands of an adversary it is a very real and scary threat.

Posted on April 21, 2016

Prepare for the Hunt: Five Practical Tips to Make Log Analysis Less Miserable

Log analysis. It’s a thing. First reactions are probably going to be “Yuck,” “Make the new guy do it,” “Insert expletive here,” or the more common “Why? What broke now?”

Posted on January 13, 2016

Sign Up for Monthly Updates

TOP ARTICLES:

QUESTIONS?