Tech Talk

News you can use

Log Monitoring Overview

The technologies that you have invested in can provide even more value if you are able to analyze the log...
Read More about Log Monitoring Overview

Web Application Security Overview

Data breaches or disclosure of information records have become a regular part of business news. According to the Identity Theft...
Read More about Web Application Security Overview

What is Penetration Testing?

Penetration Testing (often called “Pen Testing”) is the practice of evaluating a computer system, network, or application to identify vulnerabilities...
Read More about What is Penetration Testing?

Can I replace my SIEM with MDR?

When you’re deciding how to spend your valuable cybersecurity budget, it’s important to understand the options and the differences between...
Read More about Can I replace my SIEM with MDR?

Cybersecurity Regulations To Be Mindful Of

Governments enact cybersecurity legislation to protect their citizens and critical infrastructure from cyber threats, such as data breaches, cyber espionage,...
Read More about Cybersecurity Regulations To Be Mindful Of

The Payment Card Industry Data Security Standard

Many Stratix Systems clients accept credit and debit cards in their work, so we want to update you on the...
Read More about The Payment Card Industry Data Security Standard

The ABC’s of Cybersecurity

It’s becoming increasingly important for business owners, senior managers, and non-IT leaders to understand, at minimum, the basics of cybersecurity....
Read More about The ABC’s of Cybersecurity

Is it time to check your defenses?

Cybersecurity isn’t a one-time, set-it-and-forget-it process. Instead, organizations that are serious about preventing attacks will need to be diligent in...
Read More about Is it time to check your defenses?

How to Handle Security Misconfigurations

No matter how big or small your company is, security misconfigurations will always be a topic of discussion. Security misconfigurations,...
Read More about How to Handle Security Misconfigurations

Explaining Web Application Attacks

Healthcare web applications provide access for patients to make appointments and obtain copies of test results and medical records, but...
Read More about Explaining Web Application Attacks

What is Patch Management?

Patch management is the practice of keeping software up to date through software updates. The updates, called patches, are necessary...
Read More about What is Patch Management?
Scroll to Top