Nth Blog

Blog Category Archives: Security


Nth Generation Cybersecurity Event: Could negligence be your weakest link?

LogRhythm, Varonis, Cylance, and Proofpoint sponsored a full house Nth cybersecurity luncheon at Mastro’s in Costa Mesa on Wednesday, June 27th. The event, titled “Could negligence be your weakest link?” highlighted how machine learning and 3rd generation artificial intelligence are helping firms predict, protect, and prevent attacks. Specialists also reviewed Critical Security Controls best practices and discussed.... Continue Reading >>

Nth Security Panel Event in Riverside, CA

Thank you to everyone who attended the Nth Security Panel Event on June 5th at the Mission Inn in Riverside, CA. We discussed the current cyber security landscape and the increasing need for Automation, Artificial Intelligence (AI), and Machine Learning (ML). We had a great turnout! A special thank you to Varonis, Cylance, and LogRhythm who co-hosted.... Continue Reading >>

Rich Lindberg’s Presentation at the ISACA Orange County Chapter Meeting

Rich Lindberg, the newest addition to our Nth Generation security team, recently presented at the ISACA Orange County Chapter meeting on Tuesday, April 17th in Irvine, CA. The meeting was a CPE accredited event discussing the Center for Internet Security® (CIS) Controls™ v7.0 and overview of the Risk Assessment Method v1.0. CIS® Center for Internet Security® The.... Continue Reading >>

Watch Out For These New Tax Scams in 2018

With tax season underway, attackers are heavily leveraging schemes around the IRS and taxes in order to acquire your hard-earned money. By leveraging anxiety over time-sensitivity, and the threat of the government repercussions, you may experience lack of discernment. Don’t get caught in a scam trap! Here’s what we’re seeing in the field: Watch Out for These.... Continue Reading >>

Nth’s Highlights From Fortinet’s Accelerate 2018 Conference

Nth Generation attended the Fortinet Accelerate 18 Conference in Las Vegas, Nevada February 26 – March 1, 2018. Over 2,000 thought leaders, technical experts, and IT professionals attended this conference to share and learn the latest in network security. The conference offered a unique opportunity to gain hands-on technical expertise, connect with security pros and Fortinet executives,.... Continue Reading >>

Internet Explorer & Windows XP: Where Are We At?

It’s been a few weeks since Microsoft released its initial code red, Homeland-security-level threat for Internet Explorer. Now, with patches available for both IE and XP users, we can all rest easy, right? Not so fast. A Timeline with Questionable Timing  Three weeks after Microsoft formally ended its thirteen-year support of Windows XP, a major security flaw.... Continue Reading >>

Heartbleed Havoc: What You Need to Know

It’s branded, crafty and social media friendly. What, exactly, is Heartbleed and how can we protect ourselves? Don’t be fooled. Despite its luring graphic, the bug that appeared almost overnight is a serious threat to your online security. It has sent (valid) waves of panic to the heart of the internet and widely affected popular websites including.... Continue Reading >>

Security Breaches in a BYOD World

As organizations and consumers are increasingly embracing mobility and BYOD, security solutions are progressively designed to address these evolving trends. Laptops, tablets and smart phones are changing the way we live and do business, but how can we guarantee this remote access won’t drag our secure data through the mud? 2014 has been the year of hacking..... Continue Reading >>

© Nth Generation, 2014. All Rights Reserved.   Privacy Policy   |   Legal Terms