Blog Cybersecurity
blue password image

Top 5 NIST Password Guidelines

                Authentication credentials are one of the most sought-after pieces of digital information that hackers wish to obtain. It takes a lot of time, dedication, and reconnaissance for most hackers to break into a system, network, or private application through means such as vulnerabilities and exploits. However, it […]

Blog CMMC
We introduced the SP6 CMMC Guardian App powered by Splunk to help defense contractors with CMMC compliance.

Introducing the SP6 CMMC Guardian App for Evidence Collecting & Automation 

We’ve said it before: The Department of Defense Cybersecurity Maturity Model Certification (CMMC) Program is extremely complex. Contractors working within the Department of Defense supply chain must create detailed processes to show they can satisfy the DoD’s tightened data security requirements.  As a first step, contractors should focus on successfully auditing their practices and meeting […]

Blog Cybersecurity IT Observability

Here’s How to Get a Handle on Noise and Alert Fatigue

Editor’s Note: This article is co-authored by Barry Duncan, Team Lead, Professional Services Observability; and Chase Yates, Practice Manager, Security. A common problem technology teams face is the high volume of noise in their environments and the resulting alert fatigue.  Items clamoring for an analyst’s attention can include:  Threats  Anomalies  Incidents  Notable Events  According to […]