Ascent Blogs

Ascent’s view on important topics

Last week, two of our Cyber Architects, Jason Floyd and Josh Decker, attended an exclusive Microsoft Security Partner Insider Event in Chicago. At this event, we were provided insider insight into exciting new technology coming to the security space as well as deep training and conversation on the current versions of the product suite.

RSA 2016 Recap - Pete Fox Looks at Security Complexity

March 15, 2016 by Pete Fox, VP of Cyber Services

After spending the week at my first RSA Conference, it’s time to provide a perspective on what I saw and learned. First, the scale of the conference, with hundreds of vendors and over 40,000 attendees speaks volumes about the security space. The market is large and growing fast, Gartner shows double digit growth in this, one of the largest areas of software and services in the IT market. Companies are bombarded with different messages and are faced with growing complexity.

RSA 2016 Recap - Dan Ritari Looks Back on a Decade of RSA

March 11, 2016 by Dan Ritari, Principal Cybersecurity Architect

This year I once again traveled to San Francisco for the RSA Security conference. I've been to 8 of the last 9 RSA Conferences so I can provide my perspective of what's been on the mind of security professionals.

2008: Hot topic: PCI. Software trend: Data Classification

RSA 2016 Recap - Allen Brokken's Observations from the Skyport Booth

March 10, 2016 by Allen Broken, Principal Security Architect

I was fortunate enough to get the opportunity to help Skyport Systems demonstrate their product at the RSA conference last week. As I met with hundreds of people, there were 2 things that stood out in my week:

RSA 2016 Recap - Howard Friedman's view from the Expo Floor

March 10, 2016 by Howard S Friedman, Chief Strategy Officer

I had the opportunity to attend the RSA Conference this past week. As we at Ascent Solutions had a number of our Ascent team at the conference, we decided to make sure that we each view the conference through a different lens. For me, I looked for themes and differentiators on the exposition hall floor.

Mitigating Credential Theft - Using Hospital Protocols as an Approach Part 2

March 9, 2016 by Allen Broken, Principal Security Architect

In my last post (http://bit.ly/1SxQcK4) I talked about the idea of adopting a model of IT systems management that matched how a hospital deals with sick patients. In this post, I’ll be detailing solutions for adopting this model in a corporate network.

Old vulnerabilities still out there - why and what are we missing?

March 2, 2016 by Dan Ritari, Principal Cybersecurity Architect

Mitigating Credential Theft - Using Hospital Protocols as an Approach Part 1

March 2, 2016 by Allen Broken, Principal Security Architect

Administrative credential theft, whether it is an actual systems administrator’s logon or the logon associated with an application or service with administrative credentials, is the most dangerous vulnerability on my customers' networks. This is for two reasons:

  1. The tools and techniques for stealing administrator credentials are well known, highly automated and generally available to threat actors

  2. Very few corporate networks were designed to mitigate this threat.

Ascent partners with Skyport for amazing new solution

February 26, 2016 by Pete Fox, Vice President, Cyber Services

It’s a very exciting moment in the history of our company. We’ve been working hard on new ways to reduce our customer’s exposure to Credential Theft, which is the leading cause of breaches, according to the 2015 Verizon Data Breach Investigations Report.

Perspectives on Securing Enterprise Identities

February 24, 2016 by Dan Ritari, Principal Cybersecurity Architect

There are many different opinions regarding the right level of credential security for an organization. Depending on someone’s role, they might view security as anywhere from the most important to the least important aspect of their environment. Their perception of the importance of security can also be influenced by whether or not they have experienced a breach.

Filter By Date