Cyber Corner
FortiEDR Series
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Cloud Security – Where Does the Responsibility Reside?
Almost every company now leverages the cloud in some way. Whether it is a company that has all their virtual machines in a vendor’s cloud, a company that has adopted a hybrid model using cloud and on-premises gear, or a company that is only consuming a hosted...
DEMO SERIES: Security from Within
Join us as our resident security experts, Michael Fazely and Jared Carmouche, explore the topic of addressing security from within. The biggest threat to your organization might be closer to home than you realize. Learn how you can take a deeper look at your...
RECAP: VENYU Future of Work Speaker Series Part 2 – Cybersecurity
VENYU General Manager Noah Boudreaux hosted the second installment of our speaker series featuring Fortinet VP of Field CISOs Jonathan Nguyen-Duy. With an expansive breadth of experience in technology leadership and cybersecurity, he consults with over 500 security...
AV, NGAV, EDR, XDR, Oh my!
If your professional inbox looks anything like mine, it's likely inundated with marketing and sales emails from endpoint protection vendors discussing their solution and how it will protect you from the latest threats. The acronyms used will vary depending on what the...
Passwordless Future
Imagine a world with no more passwords. No more prompts to enter a username and password before gaining access to a website, service, or workstation. You’ll no longer be inconvenienced by an expired or forgotten password that you must change. Sound far off or like an...
Password Management
In keeping with the theme of the last post, we’ll continue to discuss authentication, but this time we will focus on password management. Much like MFA, password managers have become nearly a necessity in today’s world. While the general idea of a password manager is...
Multi-Factor Authentication – A Necessity for Today’s Digital World
Authentication should be a relatable concept to nearly everyone. In its most basic form, authentication is proof of an identity, with identity being merely a claim of self. An example of this would be going to a party and introducing yourself to a group of...
Crafting More Secure Firewall Rules – Part 2
In part 2 of our series on crafting more secure firewall rules, we will focus on inbound traffic and how rules can be crafted to strengthen the security posture in your organization. We will highlight a few pitfalls and provide recommendations to tighten down these...
Crafting More Secure Firewall Rules – Part 1
Firewalls are one of the most common defense mechanisms in modern cybersecurity models. From the most seasoned professional to new IT technicians, they have all encountered firewall rules or policies at some point in their career. No matter the vendor, firewalls...
Transforming Your Security Posture for Remote Work
In the wake of the COVID-19 crisis, the number of unsecured remote desktop computers increased by more than 40 percent, according to ZDNet. This explosive growth of vulnerable endpoints could trigger a feeding frenzy for thieves. Just one weak link could threaten the...
Data Centers
MORE protection for your business. Protect your services and data behind our certified data centers. 24/7/365 resources at your fingertips. Contact us for reliable cyber security in Baton Rouge.
