by John Breth | Jun 25, 2019 | Cybersecurity, InfoSec, IT Operations
The purpose of this article is to go into depth a bit on Tenable’s Log Correlation Engine (LCE) and how to utilize it with Security Center to be the focal point of monitoring events in your environment. I’m a big fan (and user) of the Tenable suite of...
by John Breth | Jun 16, 2019 | IT Engineering, IT Operations
A staple offering within Cisco’s device portfolio is their Fabric Extender (FEX) Technology. In essence, it allows you to do a few very cool things: 1.Minimize the number of switches you need to manage. FEX devices connect to upstream Nexus switches...
by John Breth | Jun 11, 2019 | Cybersecurity, InfoSec
When it comes to vulnerability and compliance scanning, Tenable has established themselves as the king of the hill. With their Nessus vulnerability scanner, you can automate and report on the security health of most devices in your environment. Recently, Tenable...
by John Breth | Jun 4, 2019 | Cybersecurity, InfoSec
Those of us in the IT industry are very familiar with the terms honeypots, digital forensics, and hackers. Even the general public has heard the terms given the global coverage on identity theft, election hacking, and rampant ransomware attacks in recent years. Back...