Lessons from the field: To the Left or Right of Boom?

Many in Cyber Security tend to focus on the security event (the “Boom”) and mitigating the impact after (to the right of) the Boom. To build true Cyber Resiliency, we need to spend as much, if not more, time to the left of Boom, building the processes for responding to the Boom or better yet, […]

Lesson from the field: Introducing Anti-goals to your project

I was talking to a client recently about a project we were working on and the term “Anti-Goal” popped up. We all know what goals are. The thing that we are trying to accomplish. Anti-goals are those things we are trying to avoid. As we discussed the goals of the project, my client said “And of course we do […]

Upcoming Features for Cyences 1.10.0

Cyences 1.10.0 enriches the data for Office 365 by adding several new dashboard panels and alerts that cover a wide array of changes and updates which are extremely useful for security admins. “Splunk Admin Checks” has been added to the app’s navigation bar to improve the auditing experience for any administrator. The dashboards under Splunk […]

How to Create a Strong Password

1. Make Passwords Long Password length is a primary factor in characterizing password strength. Passwords that are too short or are commonly used words and phrases are vulnerable to brute force attacks.  – NIST (National Institute of Standards and Technology)– Reformed hacker Kevin Mitnick recommends 20-25 characters  2. How Do I Create A Strong Password? […]

Dealing with Security False Positives in Splunk (Enterprise Security)

SIEM tools are extremely useful for security engineers, but a major problem with SIEMs are false positives. No matter which SIEM tool an organization relies on, false positives are a common denominator across the board, since these security tools are generally built to support all environments. Security engineers often find themselves manually fine tuning these […]

Cyences Version 1.6.1 Enhancements & Updates

Added a new Sophos Central endpoint metadata collection command Device Master Table has been renamed to Device Inventory Table  Enhancements have been made to the Device Inventory Table, Asset Intelligence, Forensics, and Office 365 dashboards New Linux/Unix report Sophos Central  Sophos is highly recognized as a worldwide leader in next-generation cyber security. Cyences is set […]

Aspirational thinking vs. Reality

Javier to Manager: Can I work from Sudan for a month  Manager: Will you have Internet access Javier: Yes for sure, my friend there said Internet is great and shouldn’t be a problem https://crossrealms.com/wp-content/uploads/2021/07/VID-20210730-WA0010.mp4

CrossRealms International Announces a Joint Venture with Veristar

CHICAGO and NEW YORK, Mar. 25, 2021 (GLOBE NEWSWIRE) —Crossrealms International, a premier legal and enterprise IT managed services and consulting company, announced a Joint Venture with Veristar, a premier legal services delivery firm. This Joint Venture will accelerate both firm’s offerings and solutions for corporate legal departments and law firms, creating a digital transformation […]