Archive for

Cybersecurity – General

Graphing Modem Data for Fun: Part 6

Posted: December 2, 2020

I started the work on this series three months ago, which seems like both a very long time ago, and not very long ago at all.  This blog series started out with a very simple use case.  Can we use Grafana and InfluxDB to visualize metric data from an application? I was going to write a single ...

Continue Reading

Common Challenges of Data Protection Programs

Posted: November 21, 2020

Hello and welcome back to the third installment of our Data Protection blog series.  So far, in part one we took a high-level view of the topic, then in part two we dug into the five pillars of an effective program.  Now that we understand the topic and the pieces that make it up, it’s time to ...

Continue Reading

Graphing Modem Data for Fun: Part 5

Posted: November 12, 2020

Hi there! Welcome to part 5 of the series where I explore my cable modem data with different data analytics platforms and see what happens.  In my previous posts I have built a dashboard for my cable modem data using tools that I was not familiar with.  This post is going to be different.  The ...

Continue Reading

Graphing Modem Data for Fun: Part 4

Posted: October 22, 2020

Welcome to part 4 of the series.  In the previous posts I have built a dashboard to show the status of my cable modem using different log analytics tools.  In this post I will be using Humio to build the dashboard.  Humio is a relative newcomer to the log analytics space.  A quick scan of the ...

Continue Reading

Graphing Modem Data for Fun: Part 3

Posted: October 1, 2020

I have been playing around with Elasticsearch and Kibana for a little while now.  I have installed them and run through a couple of demos. Like cooking with a recipe, things usually work out when you are following instructions. The problem is that I do not have good use case to help me explore how ...

Continue Reading

Graphing Modem Data For Fun: Part 2

Posted: September 10, 2020

In the previous post I talked about how this project got started.  A customer had a question, and I have an affinity for building systems, exploring data, and wandering down rabbit-holes.  My goal is to learn about data analytics platforms by re-creating a dashboard based on data from my cable ...

Continue Reading

Key Pillars of Forming an Internal Data Protection Practice

Posted: September 3, 2020

Hello and welcome to part two of our whirlwind overview of Data Protection.  In this blog, we’re discussing what a typical Data Protection program’s goals might be, some of the challenges we’ve seen customers encounter, and common strategies used to mitigate risks related to data loss.  If ...

Continue Reading

Data Analytics Series – Graphing Modem Data for Fun

Posted: August 20, 2020

It all started with a simple use case The idea is to send server metrics to InfluxDB and visualize the data with Grafana.  I do not know anything about InfluxDB, and I have not used Grafana in years.  Armed with this overwhelming amount of experience and knowledge, when asked if it should ...

Continue Reading

Hiding in Plain Sight

Posted: August 4, 2020

What is a RAT? There is an increasing RAT problem that security professionals need to be aware of.  To be clear, we are not talking about the 4-legged rodent, but instead, about a specific type of malware.  A RAT (“Remote Access Trojan”) is any malware that grants an unauthorized party the ...

Continue Reading

Introduction to Data Protection Series

Posted: July 9, 2020

P.T. Barnum may or may not have said “there’s no such thing as bad publicity”; however, even he would likely agree that corporations are done no favors by achieving front-page status through a data breach.  With the financial impact of an incident reaching into the hundreds of millions of ...

Continue Reading