John has nearly 25 years of experience leading the creation of IT architectures and infrastructures. As VP of Engineering, John brings a unique combination of executive management and hands-on development and administration skills. Previously the Director of Software Development at Infoblox John successfully recruited, hired, and trained a team of top-notch software developers, nearly tripling the size of the development team.
Read the FourV Blog
ELK Stack for Security Operations, Analytics and Reporting
The challenges that IT security teams face can often be condensed into two critical questions: how can I grapple with the security data that we generate, and how can our tools rapidly adapt to our changing business needs?
Security Log Management Made Easy (Kind Of)
Unfortunately, security log management is one of those complex, involved cyber security program management tasks that may never be as straightforward as you hope it could be. The good news, however, is that it can very likely be made easier than whatever processes you currently have in place.
CISOs: How to Prioritize SIEM Events
Even if you have the latest, greatest cyber security solutions in place, you still need humans within your organization who can use them effectively. Unfortunately, many IT security analysts tend to inherently distrust information that they receive from vendor products, such as firewalls or antivirus software, about the severity of an event.
Talk to Casey
Casey would be happy to speak with you. Schedule some time on his calendar to connect.