Nexum News

Below are resources from the experts at Nexum.

Most Recent Resources

Get our quarterly email newsletter in your inbox.
You can also subscribe on LinkedIn.

Subscribe for Emails
Subscribe on LinkedIn
Nexum Resources

Enterprise Logging Best Practices

Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, we decided to share some general logging best practices that are likely to benefit every organization.

Read More »

Acronym Series

In this series, our engineers define some of the industry’s most widely used terms.

Acronym Series

Acronym Series Introduction

Our new Acronym Series hopes to help our readers navigate the acronym-filled waters of IT discussions. Each article will give the acronym, the shortened phrase, a brief definition, and a little information to help you understand it. 

Read More »

API Security Series

In this Application Programming Interface (API) security series, we review how to use these interfaces and exploit them.

Automation Series

The topic on everyone’s minds right now: Automation.

Ransomware Series

Ransomware is on the rise. Dive further into this topic with Nexum’s engineers.

Nexum Resources

Let’s Play a Game

In the final post of our Ransomware Series, we’ll examine deception technology, how it has evolved, and how to tilt the odds in your favor to win the cybersecurity game.

Read More »
Nexum Resources

Prevent Ransomware with SASE

There are three technologies that can help prevent ransomware: Cloud access security broker (CASB), secure web gateway (SWG), and data loss prevention (DLP). These components have converged into a single solution for what has now been coined the secure access service edge (SASE) architecture.

Read More »

Nexum Insights

Each quarter, the managed security team at Nexum shares insights from our first*defense®
Security and Network Operations Command Centers (SNOCC).

Nexum Resources

Enterprise Logging Best Practices

Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, we decided to share some general logging best practices that are likely to benefit every organization.

Read More »
Nexum Resources

SNOCC Quarterly Threat Update Q1 2023

Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, macro trends include vulnerabilities in Exchange, socially engineered phishing, IoT, Edge and infrastructure devices, and geo-blocking.

Read More »

Strategy Series

Updates on the state of the industry
and commentary on crucial topics that may shift your thinking. 

Nexum Resources

Visibility Matters

Why has visibility become so difficult? Where do you start to build your strategy? We’ll also discuss IoT devices, ASM, and CSPM.

Read More »
Nexum Resources

The Role of Security

Nexum’s VP of Strategy, Ron Temske, considers the function of security and how it has evolved. And how security should be incorporated into strategic plans.

Read More »

Visibility Series

What is really in your environment, and more importantly, how can you secure it? 
Learn more through our Visibility Series with Nexum’s Security Specialist, Sarah Lantz.

network alerts visibility banner
Nexum Resources

Network Alerting

One of the primary things Information Technology (IT) and security teams continue to contend with are alerts. Every system has the capability to generate an alert. Is it some sort of security alert? Some sort of uptime alert? Perhaps an alert indicating that too many alerts have been generated in too short a time? Either way, the volume of alerts likely involves headaches for everyone.

Read More »
shadow it visibility banner
Nexum Resources

Flashlight on Shadow IT

“You cannot secure what you do not know.” I frequently see iterations of this phrase when it comes to cybersecurity and visibility. When a security team looks to gain insight into what is being used in their network, they won’t be able to secure what they can’t see or are not aware of. It’s here that the buzzword of Shadow IT (Information Technology) is also commonly thrown around. You can think of Shadow IT as the thing that you do not know is on the network – and therefore cannot secure.

Read More »
gray overlay of an engineer working on multiple screens
Nexum Resources

Tackling the Visibility Monolith

Until recently, I had only thought of visibility as a monolithic and all-encompassing function – a “catch all” that various teams dive into when they need a clear view of what is occurring in their network. However, I’ve learned that different teams need different views into how their systems communicate across the entire enterprise. As teams grapple with the concept of what is in the environment, and what needs to be secured, “visibility” is the word everyone comes back to.

Read More »

Partner Resources

Updates and news about our technology partners

Juniper

Wi-Fi 6 and 6E at a Glance

A free guide highlighting some of the improvements of Wi-Fi 6 over the “last” major version of Wi-Fi: Wi-Fi 5 or 802.11ac, and what Wi-Fi 6E brings to Wi-Fi 6.

Read More »
Juniper

Juniper Mist Takes On SD-WAN

Nexum, Inc.’s technology partner Juniper recently announced it was adding support for the SSR (Session Smart Routing) product line to its Mist portal. But beyond including another part of the Juniper family in the portal, why is this a big deal? And how does this help clients who may just be getting started with their Mist journey? How does this help clients run their network more easily in the long run?

Read More »
Juniper

Juniper Networks: A Leader in 2021 Gartner Magic Quadrant

This week, Gartner released the 2021 Magic Quadrant for Enterprise Wired and Wireless LAN Infrastructure and Juniper Networks was recognized as a Leader for the second year in a row, positioned furthest in both Ability to Execute and Completeness of Vision. This is, without a doubt, one of the most special career moments for Mist and a great example of what startups can achieve with an amazing team.

Read More »
Juniper

A Look Back (and forward) at Juniper’s AI-Driven SD-WAN Journey

Prior to its acquisition by Juniper Networks, 128 Technology celebrated each year on 1/28 – and together, we’re keeping the tradition alive! This anniversary is especially exciting as it’s been just over one year since the companies came together. So, it’s the perfect occasion to look back at what has been achieved in this short period of time and discuss the more exciting things that are still yet to come.

Read More »
Juniper

Assuring Excellent User Experiences with AI-Driven SD-WAN

Over the past few years, it goes without saying that the world has experienced a great deal of ups and downs. Companies have had to adapt to remote work environments, hybrid work environments and everything in between. Through it all, one thing has proven its importance – the need to provide an excellent user experience no matter where the workforce is located.

Read More »

All Nexum Resources

Enterprise Logging Best Practices

Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, we decided to share some general logging best practices that are likely to benefit every organization.

Read More »

Nexum at Red Hat Summit

Nexum’s Peter Scudamore and George Grzyb talk about workshops introducing automation to network engineers and other tools that will help mitigate some of those after-hours calls at Red Hat Summit.

Read More »

Let’s Play a Game

In the final post of our Ransomware Series, we’ll examine deception technology, how it has evolved, and how to tilt the odds in your favor to win the cybersecurity game.

Read More »

SNOCC Quarterly Threat Update Q1 2023

Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, macro trends include vulnerabilities in Exchange, socially engineered phishing, IoT, Edge and infrastructure devices, and geo-blocking.

Read More »

DNS Privacy (DoT & DoH) & Enterprise Security

DNS privacy and security are two considerations with competing goals. DoT and DoH undermine enterprise security for the benefit of privacy. ECS erodes privacy for distributed cloud-based resources. Let’s look at how these standards work and your options in defense or offense.

Read More »

The Role of Security

Nexum’s VP of Strategy, Ron Temske, considers the function of security and how it has evolved. And how security should be incorporated into strategic plans.

Read More »

Acronym Series Introduction

Our new Acronym Series hopes to help our readers navigate the acronym-filled waters of IT discussions. Each article will give the acronym, the shortened phrase, a brief definition, and a little information to help you understand it. 

Read More »

Nexum Summer Summit 2022 Recap

In July, Nexum held our first annual Summer Summit event. It was a wonderful opportunity to get a significant portion of the company together in Chicago to reconnect, learn, and have a lot of fun.

Read More »

CISO Guide to Ransomware

Our partner Abnormal Security is disrupting the email security market. Receive your free CISO Guide to Ransomware – How It Starts via Email and How to Prevent It.

Read More »

Prevent Ransomware with SASE

There are three technologies that can help prevent ransomware: Cloud access security broker (CASB), secure web gateway (SWG), and data loss prevention (DLP). These components have converged into a single solution for what has now been coined the secure access service edge (SASE) architecture.

Read More »

Nexum at Central Ohio ISSA InfoSec Summit

Nexum at Central Ohio ISSA InfoSec Summit Written by: Scott Hammond, Senior Security EngineerConnect with us on LinkedIn Recently several members of Team Nexum attended the 15th annual Central Ohio ISSA InfoSec Summit in rainy Columbus, Ohio. As a well-respected event for security-minded professionals to gather and discuss today’s critical

Read More »

20 Years of Security

Founded in April of 2002, we are proud to celebrate our 20th anniversary. This post includes quotes from Founder and CEO of Nexum and a Back in 2002 infographic.

Read More »

The Issue With Open-Source Code Utilization

Due to ongoing geopolitical events, particularly the Russia-Ukraine conflict, some individuals have begun to “poison” major open-source projects to try to cause damage. There were developers (cyber-activists) that chose to introduce code specifically targeting computers in Russia and Belarus.

Read More »
banner image for attack observations since the russia invasion of ukraine

Attack Observations Since the Russian Invasion of Ukraine

Nearly a month has passed since the start of the Russian invasion of Ukraine. Before this, the “Cold War” of cyberattacks has consisted of plenty of nation-state-sponsored activity against Western targets. But until now, this activity has not been a weaponized component in an active physical conflict with Western countries (whether direct or, in this case, by proxy).

Read More »
network alerts visibility banner

Network Alerting

One of the primary things Information Technology (IT) and security teams continue to contend with are alerts. Every system has the capability to generate an alert. Is it some sort of security alert? Some sort of uptime alert? Perhaps an alert indicating that too many alerts have been generated in too short a time? Either way, the volume of alerts likely involves headaches for everyone.

Read More »

Critical Vulnerability Alert: Log4j

Critical Vulnerability Alert: Log4j  This page will be updated as additional information is released.  Last Updated: December 20, 12:00pm EST  On December 10, National Institute of Standards and Technology (NIST) issued a Common Vulnerabilities and Exposures (CVE) for a vulnerability in Log4j. This vulnerability when exploited can lead to the attacker having the ability

Read More »
shadow it visibility banner

Flashlight on Shadow IT

“You cannot secure what you do not know.” I frequently see iterations of this phrase when it comes to cybersecurity and visibility. When a security team looks to gain insight into what is being used in their network, they won’t be able to secure what they can’t see or are not aware of. It’s here that the buzzword of Shadow IT (Information Technology) is also commonly thrown around. You can think of Shadow IT as the thing that you do not know is on the network – and therefore cannot secure.

Read More »

2021 Nexum Security Open

2021 Nexum Security Open: A Tee-rific Event Putter late than never! It was fantastic to finally be able to get together in person last week with some of our partners, clients, and new friends at Seven Bridges Golf Club outside of Chicago, IL. We hit the greens on a gorgeous

Read More »
gray overlay of an engineer working on multiple screens

Tackling the Visibility Monolith

Until recently, I had only thought of visibility as a monolithic and all-encompassing function – a “catch all” that various teams dive into when they need a clear view of what is occurring in their network. However, I’ve learned that different teams need different views into how their systems communicate across the entire enterprise. As teams grapple with the concept of what is in the environment, and what needs to be secured, “visibility” is the word everyone comes back to.

Read More »

Why Nexum first*defense?

Why Nexum first*defense®? Optimize your resources, defend your investments, and take back your network with Nexum first*defense, our suite of managed and monitored services. We know it’s a constant struggle to find the necessary resources to run your network security operations effectively. Nexum can augment your team’s operations by monitoring

Read More »

Nexum Recognized on CRN’s 2021 MSP500 List

Chicago, IL – Nexum, Inc., a leader in networking and cybersecurity solutions announced today that CRN®, a brand of The Channel Company has named Nexum® to its 2021 Managed Service Provider (MSP) 500 list in the Security 100 category. This popular list identifies North American solution providers that deliver operational

Read More »

Press Releases

For press inquiries, please contact pr@nexuminc.com

Press Releases

Nexum, Inc. to Offer Versa Networks SASE

CHICAGO, IL, March 9, 2022 – Nexum, Inc., a leader in networking and cybersecurity solutions, announced today that Versa Networks, a secure access service edge (SASE) leader, is now part of its growing list of exceptional technology partners. Nexum will now offer Versa SASE and Versa secure software-defined wide area network (SD-WAN) to its customers.

Read More »