<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

Cadre Blog

Never miss the latest in IT Security! Subscribe Now.

SecureWorld Cincinnati

Cadre Information Security is proud to be a sponsor and exhibitor at the SecureWorld Cincinnati.

Read More

Building CyberSecurity Awareness

October is National CyberSecurity Awareness Month (NCSAM)

This campaign was created as an effort to ensure Americans have the resources and information they need to be safe and more secure online. 

There's been a massive number of cyberattacks...

Read More

How to Encourage Your Team to use Stronger Passwords

If you work in any sort of IT/cyber security role, you know it’s imperative to be concerned with hacking. It’s scary out there, especially with increasing reports of organized cyber-criminals going after any sized company, not just the bigger...

Read More

What is Malware?

Malware is a portmanteau of "malicious" and "software". As the name implies, malware is created solely to harm and inconvenience people by corrupting devices and/or data. 

Read More

What is a value-added reseller?

A value-added reseller (VAR) is a company that takes an existing product and adds extra features and/or services to it. This is typically in order to sell an integrated product to end users as a turnkey solution. Value-added resellers can do just...

Read More

Understanding Password Manager’s Risks and Rewards

These last several weeks have brought up a lot of interesting discussions around passwords and password management, both personally and in the enterprise. 

Read More

When a Technology Becomes a Security Control

As a Chief Information Security Officer (CISO) or Information Security manager, you have to make decisions on how to best mitigate and handle risks for your business.  

Read More

Small Vulnerabilities Can Lead To Catastrophic Results [Part 2]

Not all leaks are the result of malice.

In 2006, America On-Line (AOL) negligently published 20 million web queries from over 650,000 of its users. This simple accident resulted in an incalculable amount of brand damage to AOL, and it could have...
Read More

Small Vulnerabilities can lead to Catastrophic Results [part 1]

When it comes to security, most IT departments focus primarily on network and application security.

By now, we've all read news stories about vulnerabilities in various software and are familiar with the importance of preventing unwanted network...

Read More

It’s Not Fear Factor, it’s Multi-Factor

What is multi-factor authentication?Multi-Factor Authentication (MFA) is a method used to grant access to a computer or application. Of course the access is only granted after the user has provided a username and two types of authentication...

Read More

5 Major Benefits of Security Assessments

Security assessments should be a part of any company’s security program. At a high level, they measure a company’s security posture against industry best practices, compliance requirements and industry frameworks.  It takes into consideration...

Read More

Encoding, Hashing, and Encryption: What’s the difference?

Encoding, hashing, and encrypting are common concepts applied and discussed when trying to secure data.  Many vendors claim to use strong encryption methods and standards, but it is necessary for a security team to assess whether it really is...

Read More

Your Single Source for Security Guidance

Your network is important to you and it's critically important to us.

Does alignment of business, organizational and technical goals seem impossible to you? 

Not to us. 

Since 1996, Cadre has been the single source for security guidance, enabling...

Read More

Inspecting Encrypted Network Traffic

Encrypted traffic is becoming increasingly prevalent on corporate networks.  

Read More

Taking Over Master Membership and Securing VRRP

Topology:

Part 1 (No Firewall Module)

Instructions for setup are in the link above. You must install two firewalls and configure VRRP on both of them to act as a cluster.  The first part of this exercise is pure VRRP with no firewall module...

Read More

Breach Mitigation: Will It Take a Village?

No one is immune from data breaches. We’ve witnessed department stores, hospitals, insurance companies, media giants, dating websites, the federal government and so many others in the news almost daily with yet another breach.

This dominated the...

Read More

Cadre's Story

Very few people were talking about network security when Cadre was formed back in late 1991. By most accounts, the first firewall was invented a year later, circa 1992, to the credit of multiple inventors. In the world of security technology,...

Read More