Find additional Electroblogs using the search box below.
by Eric Wesley
Choosing the right security platform can significantly impact an organization’s ability to detect, respond to, and contain cyber threats. While both Splunk and Elastic (ELK Stack) offer log management capabilities, Splunk is engineered with a security-centric…
by David Nash
In the Agile Scrum process, a user story explains a product feature. Written from the end user’s perspective, it articulates how a feature will provide value to a customer. The operative word here is “user.” The story should reflect a specific user’s perspective…
by Melissa Barnes
ISO standards — developed by the International Organization for Standardization — are internationally recognized frameworks that help organizations operate more efficiently, deliver better quality, and ensure safety, security, and sustainability. For…
by Ade Makanjuola
In today’s digital landscape, traditional network security perimeters are insufficient to protect against sophisticated cyber threats. Zero Trust (ZT) security models, which assume no user, device, or system should be trusted whether inside or outside the…
by Sean McGinnis
The National Institute of Standards and Technology (NIST) released the Second Public Draft of Special Publication 800-63, Revision 4 (SP 800-63 Rev 4),…
by Peter Martini
“We failed him,” said our Command Sergeant Major when our organization’s commander was not selected for promotion. In an instant, I moved from empathy to introspection and began a journey of asking, “Am I responsible for my boss’s success, and, if so, how…