Structured Blog

People. Knowledge. Experience. Where great service meets great technology.

Information Security

Modern malware and weaponized threats met by an increasing attack surface of data and a nebulous network perimeter – this is the State of Information Security.

Information Security
AI Replaces AV in Today’s Endpoint Protection Battles
Antivirus, commonly known as AV, isn’t the most alluring topic – even among IT secur...
Read More »
Information Security
Privacy Matters: A Look at the California Consumer Privacy A...
By Rob Wayt, CISSP-ISSEP, HCISPP, CISA, CISM, CRISC, CEH, QSA Sometimes we could all use a littl...
Read More »
Information Security
Back to Basics – Inventory Documentation and Network V...
By Brad Pierce, Structured Managing Director of Security, CISSP/CISA/PCIP One of the first things y...
Read More »
Information Security
Supply Chain Hacking 101
An educational piece about the supply chain attack By Jesse Wilson, CISSP, @CyberWarior1775 To star...
Read More »
Information Security
Don’t Just Patch – Prevent! Establish trust thro...
By Gizzelle Akin, Structured UC Solutions Advisor Staying up-to-date on the latest technologies and...
Read More »
Information Security
Pokéman GO gets your data… all of it
Pokémon GO is a species all its own. Recently launched by software developers Niantic, the augmen...
Read More »
Information Security
Apple’s Fight for Security and Privacy
By Collin Miller @MobileSecOps   Apple CEO Tim Cook continues to make headlines for his refusal...
Read More »
Information Security
Ransomware in Healthcare
By Collin Miller @MobileSecOps   The Atlantic reports that a Los Angeles hospital has been ope...
Read More »
Information Security
Why Good Times and Bad Call for Better Data Security
Aside from the routine internal and external threats to your company’s sensitive data, economic fa...
Read More »
X