The security industry has trained customers to ask for and talk about the 24×7 Security Operations Center (SOC). For the majority of organizations, that’s barking up the wrong...
Authored by PTP’s Rich Hauke, CISSP and Steve Hoevenaar, CISSP While working with our customers to cost effectively address key risks and to make sense of the security threat landscape, PTP leverages the NIST Cybersecurity Framework. PTP utilizes this framework...
IDENTIFY > PROTECT > DETECT > RESPOND > RECOVER. These are the five key functions of the NIST Cybersecurity Framework. At PTP, we leverage the Framework as a vehicle to discuss the layered approach to security with our growing Amazon Web Services (AWS)...
One of the numerous advantages we have within the PTP PeakPlus team is our ability to customize, automate, and expand security services that, in some cases, even the security vendor is unable to provide. Our customer needed a replacement for Cisco Cloud Web Security...
The recent announcement on the Capital One breach that affected over 100 million people (good detail from Krebs on Security here) is compelling for a number of reasons. One, it was related to data on the Amazon Web Services (AWS) cloud, which cloud nay-sayers will use...
We based our business in the Greater Boston area to focus on delivering high-growth and secure cloud computing for biotechnology and life sciences companies, where Boston is the #1 city in the US in both biotech jobs and square footage of office/lab space. Our charter...