Nexum at Red Hat Summit
Nexum’s Peter Scudamore and George Grzyb talk about workshops introducing automation to network engineers and other tools that will help mitigate some of those after-hours calls at Red Hat Summit.
A Business Case for Being a Good Leader
Cybersecurity professionals are facing high rates of burnout. Many feel overworked and undervalued. In this Strategy Series post, Ron Temske makes the case for being a good leader.
SNOCC Quarterly Threat Update Q2 2023
Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCCs. In this post, we discuss detection challenges and the importance of context.
Let’s Play a Game
In the final post of our Ransomware Series, we’ll examine deception technology, how it has evolved, and how to tilt the odds in your favor to win the cybersecurity game.
Request for Comments
In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics, like Request for Comments (RFC).
Work Smarter Not Harder with Automation
This new series will focus on IT automation and how it can help organizations with the familiar desire to “do more with less.”
Wireless LAN Professionals Conference 2023
Nexum attended this year’s Wireless LAN Professionals Conference (WLPC) in Phoenix, AZ. Check out the recap!
SNOCC Quarterly Threat Update Q1 2023
Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCCs. In this post, macro trends include vulnerabilities in Exchange, socially engineered phishing, IoT, Edge and infrastructure devices, and geo-blocking.
DNS Privacy (DoT & DoH) & Enterprise Security
DNS privacy and security are two considerations with competing goals. DoT and DoH undermine enterprise security for the benefit of privacy. ECS erodes privacy for distributed cloud-based resources. Let’s look at how these standards work and your options in defense or offense.
Evolved Email Security & NGFW Help Prevent Ransomware
Email security and NGFW may seem like standard practice, but as these technologies evolve, so do the threats against them, like ransomware.