Cookie-cutter approaches do not work in Information Security. The economy of scale yields a lack of security, in our opinion. Though we do bring extensive templates, lexicons, and tuning processes to a managed services engagement, we take great pride in our ability to customize our detection and response methods to your unique needs. Our decision trees, calling trees, and response methodologies will be customized to your unique situation. Meanwhile, we can write signatures for any situation you can imagine. As founders of bleedingsnort.com, we have been writing signatures since 2003. Ask our existing Clients if they think we take a “generic” approach to security!
Leave a comment
Another awareness poster for YOUR customers (and users). Now that we have our own em Read more
Some of them about passwords . . . By view count, here are the top seven posters as o Read more
Devices like fax machines and copiers are often classified as office supplies and sli Read more
Seven trends impacting Information Security Officers of Small Institutions! Another o Read more