Is MFA Enough? No, It is Not

Anyone in the cybersecurity field will tell you that enabling Multi-Factor Authentication is the single most important service to prevent nefarious account take-overs. While this information is true, it is also artificially imputed that with MFA enabled, password security is reduced. 
Posted in Blogs, Home Page, Resource Featured Post | Tagged , | Leave a comment

Benefits of a SIEM with Advanced Configuration

It is 3:00 am and you get a call from your service provider that monitors your network for cybersecurity attacks. These are the calls you dread.  The analyst tells you they are seeing a real-time MS-SQL injection attack. The attack is coming from a source in China to one of your servers. 
Posted in Blogs | Tagged , , | Leave a comment
false positive

Understanding False Positives

StratoZen espouses a near-zero false positive rate of alerting in our SIEM and SOC as a service environment to our clients. That is a pretty bold statement, one challenged frequently as a result of a misunderstanding. So, what exactly is a false positive?
Posted in Blogs | Tagged , | Leave a comment


As I spoke with many CIOs and heads of IT at a recent financial services conference, I realized that these organizations are tired of being told that they need to change out their technology stack, replace the systems and SIEM solutions they have already invested in, or add yet another piece of agent software to the systems. 
Posted in Blogs | Tagged , | Leave a comment

StratoZen, Fortinet Security Fabric, and FortiSIEM

The best fabric in the world must be custom tailored by an expert to achieve the perfect fit. The Fortinet Security Fabric is a groundbreaking approach to information security, and StratoZen is the custom tailor that makes the Security Fabric fit your business.
Posted in Blogs | Tagged | Leave a comment

Are you just monitoring the front door while your house gets raided?

The world of cybersecurity has had some fundamental shifts in the past few years that have made the vast majority of companies unprepared for today’s threats.  The proliferated use of malware for example has dramatically reduced the intrinsic value of traditional security solutions such as firewalls, IDS/IPS, and anti-virus software. 
Posted in Blogs | Tagged , , , | Leave a comment

Data Breaches Costs and Impacts

The term “Go Big or Go Home” was first used by an exhaust system manufacturer in the ‘90s named Porker Pipes who primarily sold to Harley Davidson Motorcycles.  The term has been reused, rehashed, and repurposed over and over in the subsequent 20+ years by just about everyone. 
Posted in Blogs | Tagged , | Leave a comment

Your Security Solution May Just Be a Tool

A huge industrial fire breaks out at a warehouse in the lower east side of the city.  Black smoke billows high into the air which can be seen for miles around as people evacuate to safety.  Part of the building collapses and screams can be heard from inside. 
Posted in Blogs | Tagged , | Leave a comment

Preventing Information Security Breaches

Modern information security breaches follow a very specific pattern and most organizations are simply not designed to stop these attacks, and unfortunately not even able to detect them for months and sometimes years later.  In short, hackers today use malware rather than direct attacks to compromise organizations like Anthem, Target, Home Depot, JP Morgan Chase, Ebay and most others over the past several years. 
Posted in Blogs | Tagged , | Leave a comment