Graphing Modem Data For Fun: Part 2
In the previous post I talked about how this project got started. A customer had a question, and I have an affinity for building systems, exploring data, and wandering down rabbit-holes. My goal is to learn about data analytics platforms by re-creating a dashboard based on data from my cable ...
Continue ReadingKey Pillars of Forming an Internal Data Protection Practice
Hello and welcome to part two of our whirlwind overview of Data Protection. In this blog, we’re discussing what a typical Data Protection program’s goals might be, some of the challenges we’ve seen customers encounter, and common strategies used to mitigate risks related to data loss. If ...
Continue ReadingReady, Set, Secure Episode 11
Click here to listen to the latest episode! This week Michael and Nick chat with Senior Security Consultant Daniel Thrasher to discuss Malicious AMI’s, NIST Zero Trust architecture, and Daniel’s upcoming video series: “Coding your Cloud Move” Things Mentioned: ...
Continue ReadingUnderstanding Cloud Encryption and Key Management – Part 2
As organizations go through digital transformation and embrace cloud platforms and SaaS (software-as-a-service) applications, security remains crucial. You have to maintain compliance with regulatory and industry frameworks, while navigating the shared responsibility model and the elements of cloud ...
Continue ReadingData Analytics Series – Graphing Modem Data for Fun
It all started with a simple use case The idea is to send server metrics to InfluxDB and visualize the data with Grafana. I do not know anything about InfluxDB, and I have not used Grafana in years. Armed with this overwhelming amount of experience and knowledge, when asked if it should ...
Continue Reading