If you are in the Austin area, please join Pinnacle Technology Partners at InfoSec Southwest in Austin from 4/11 – 4/13. I’ll be presenting and demonstrating how to extend the value of a Security Information Event Manager (SIEM) through the receipt of...
We’ve got clients in all stages of cloud adoption, from the nascent migrators to the “we’re all ins.” Each stage of the journey has its own challenges, and our job is to engineer solutions for each client, at each stage. The final stage in the cloud journey (if there...
Technology, much like a new car, needs to be test-driven and vetted before you commit. So, we took Fluency for a spin and did the comps. And it came out a winner in our book. A large number of our customers still have simple protection technologies in place, but have...
This past year, we saw an accelerated sophistication of high profile security threats, a proliferation of new vendors, an increasing shortage of IT skills, and a pace of innovation in the Cloud that is exceeding many organizations’ abilities to keep up. What’s in...
wo processor vulnerabilities are currently in the news, and here’s a summary on the vulnerabilities and how customers may be affected, in addition to how Pinnacle’s threat hunting services detect and mitigate risks in these exploits. In a nutshell:Meltdown allows a...
A very large percentage of security breaches are caused by human error. HUMANS are the weakest security link in today’s technology infrastructure. That said (and perhaps ironically), best security practices require continual human examination and intervention, even...