Building a Culture of Security

Andrea DiGiacomo | April 26

We all hear about cyber security a LOT. It’s constantly in the news, one company after another becomes victim to an attack, recently some of the biggest names in business included — Under Armour’s MyFitnessPal app, Panera Bread, Boeing, the City of…

Overwhelmed?!?!

Larisa Gelis | May 7

Do you ever feel overwhelmed or stressed at work? I’m always thinking there…

Help! We’ve been compromised!

Khaled Antar | May 3

But, wait we umm.. never finished our Cyber Security Strategy… because you know…

I Don’t Know

Danny Levy | April 30

I don’t know how to do that. I don’t know what you’re asking…

We don’t take Cybersecurity Seriously Enough

Mike Burns | April 26

Lack of sharing breach Information - Every day the news is packed with…

Selling Cybersecurity

Joe Ireland | April 26

I attended an event last night where an Army General gave a talk…

IT Support: Every Question is a Security Question

Jake Jones | April 26

In every industry there are times when you realize the landscape is completely…

The Total Cost of a Cyber Security Attack

Travis Sachse | April 25

As of CFO, you are always looking at the potential return on any…

We are not taking cyber security seriously enough

Chris Sachse | April 25

I have the privilege of being a member of a great peer advisory…

What Do You Do, Think|Stack?

Chris Sachse | April 20

Last week, while attending an event on the west coast, I was arriving…

Preventing Lateral Movement Using Network Access Groups

Mike Burns | April 19

At least once a week I get on a rant about network segmentation…

My 4 Days at Harvard

Andrea DiGiacomo | April 15

I was lucky enough recently to spend a few days at Harvard Business…

…Always Be Prepared to Throw the Plan Out the Window

Andrea DiGiacomo | April 15

In a previous post of mine, I talked about all the reasons it’s…

Always Start with a Plan…

Andrea DiGiacomo | April 15

This is part 1 of 2— Always start projects with a plan. Even…

GDPR and How It May Impact You

Chris Sachse | April 12

General Data Protection Regulation. Lately we have been fielding a lot of calls…

TS Tech Talk — OpenDNS as part of an holistic defense against Ransomware/Malware

Travis Sachse | March 20

At Think|Stack, we have a group in our internal message system where non-technical…

Dude, Where’s my Phone?, ask AirWatch

Mike Burns | March 8

Looking outside at 6:30 AM to see 9 inches of snow resting on…

Sophos Antivirus Root Cause Analysis Tool

John Van | March 7

In the past, Antivirus software was relatively simple and did a decent job…

The Case for Monitoring Internal Network Activity

Mike Burns | March 3

As a Security Engineer, you are always looking to get your hands on…

What I Learned about Ransomware

Andrea DiGiacomo | February 28

Like many people I’ve heard about Ransomware and had a surface understanding about…

Sometimes You’re the Hammer

Jake Jones | February 28

Have you ever heard the saying Sometimes you’re the hammer, sometimes you’re the…

Cyber Vigilance Required by HR Departments

Chris Sachse | February 27

This morning I came into the office and was greeted by our human…

Why Training and Certification is Important

Sean Meadows | February 26

“The only thing more dangerous than someone who doesn’t know what they are…

Who controls the PC? You or the Malware?

Alex Welkner | February 16

The worst feeling when working on a PC is that moment where you…

You’re a sales person with no IT background. How do you keep up?

Joe Ireland | February 12

First off, if you don’t have some underlying interest or curiosity in technology…

SWAT Team

Chris Sachse | February 9

Do you have a SWAT team at your company?…

Customer Service Through Process

Jake Jones | February 1

When you mention process a lot of people are immediately turned off. It…

Why Invest in a Project Management Program

Andrea DiGiacomo | January 29

Recently, I was on a client check-in call with our account management team…

Finding Balance Before the Crockpot Short

Chris Sachse | January 26

2 years ago, I boarded a red eye from Seattle on my way…

MSP: Managing Vendors During Spectre and Meltdown

Mike Burns | January 10

At Think|Stack, we have a un-official “Preferred Vendors” list. These are tools and…

Peering Behind the Curtain of Security Events at Think|Stack

Chris Sachse | January 6

Over the past few months we have been quite busy with cyber threat…

Running the Intel Meltdown Detection Tool

Mike Burns | January 5

All the reading that I’ve been doing over the past 2 days left…

Meltdown and Spectre As It Pertains to the Cloud

Zach Hill | January 4

Yesterday information began to trickle out about the Meltdown and Spectre vulnerabilities. At…

’Twas the Night Before Christmas

Khaled Antar | December 24

’Twas the night before Christmas, when all thro’ the Stack, Not a device…