The CINS Blog

Our perspective on the state of cybersecurity, and valuable information aimed at fulfilling our mission to provide effective, affordable network security solutions to lean IT teams.

Most Recent

CISOs Lean on More Than Just Technical Skills As They Face New Threats: An Interview with Ian Thornton-Trump

By Ted on Jan 31, 2023

CISOs Lean on More Than Just Technical Skills As They Face New Threats: An Interview with Ian Thornton-Trump

(This is the second installment of our new CISO Interview series. Read the first one here.) Becoming a Chief Information Security Officer (CISO) is usually the result of a long journey for a cybersecurity professional. Most C-Level technologists started their careers at the strictly technical end of the spectrum. Read More

Cyber Hygiene, Cyber Health and Cybersecurity: What’s the Difference?

By Ted on Nov 26, 2022

Cyber Hygiene, Cyber Health and Cybersecurity: What’s the Difference?

Cyber hygiene, cyber health, cybersecurity. They all seem like interchangeable phrases. But you wouldn’t interchange “doctor”, “nutritionist”, and “surgeon.” While a lot can slip through the cracks, it’s important to draw a distinction between the three disciplines in order to properly identify areas of pain and correctly prescribe improvements. Read More

Cybersecurity in City Government, Taken To New Heights: An Interview with Shane McDaniel

By Joe Pettit on Nov 09, 2022

Cybersecurity in City Government, Taken To New Heights: An Interview with Shane McDaniel

When most people speak of any city government, they often mention words like “Bureaucratic”, “Behind the times”, and “Slow.” This is especially true when considering cybersecurity initiatives. However, a small town in Texas is changing that view. Seguin, Texas, which was once the smallest Texas city to have a full-time… Read More

Network Cloaking - A Secret Weapon For Managed Network Detection & Response

By Ted on Oct 28, 2022

Network Cloaking - A Secret Weapon For Managed Network Detection & Response

If you recall the cloaking device from so many Star Trek episodes, Network CloakingTM is designed to do essentially the same thing – hide the network entirely and circumvent any trouble that comes from being seen. Many security solutions leave networks (and their open ports) exposed to outside forces, leaving… Read More

Put Us In Your Corner.

We back you up with managed threat protection, visibility, and support, 24/7.