Nexum at Red Hat Summit

Nexum’s Peter Scudamore and George Grzyb talk about workshops introducing automation to network engineers and other tools that will help mitigate some of those after-hours calls at Red Hat Summit.

A Business Case for Being a Good Leader

Cybersecurity professionals are facing high rates of burnout. Many feel overworked and undervalued. In this Strategy Series post, Ron Temske makes the case for being a good leader.

SNOCC Quarterly Threat Update Q2 2023

Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCCs. In this post, we discuss detection challenges and the importance of context.

Let’s Play a Game

In the final post of our Ransomware Series, we’ll examine deception technology, how it has evolved, and how to tilt the odds in your favor to win the cybersecurity game.

Request for Comments

In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics, like Request for Comments (RFC).

SNOCC Quarterly Threat Update Q1 2023

Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCCs. In this post, macro trends include vulnerabilities in Exchange, socially engineered phishing, IoT, Edge and infrastructure devices, and geo-blocking.

DNS Privacy (DoT & DoH) & Enterprise Security

DNS privacy and security are two considerations with competing goals. DoT and DoH undermine enterprise security for the benefit of privacy. ECS erodes privacy for distributed cloud-based resources. Let’s look at how these standards work and your options in defense or offense.