<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

Cadre Blog

Never miss the latest in IT Security! Subscribe Now.

Join us at the Data Connector’s Tech - Security Strategies conference

Pop on over to our booth at the Data Connector’s Tech-Security Strategies conference. This year’s conference is being held at The Westin in downtown Cincinnati.  Register today and you can earn CPE credits!  They will be providing breakfast, lunch...

Read More

Talk About Cloud First or Get There Last

By: Phil Swaim

There is no doubt one of the greatest innovations in IT of the last 10 years has been the public cloud and virtualization. Being able to deploy resources for storage, computing, and communication with 0 capital expenditure, little...

Read More

GRC Roadmap Webinar

In this webinar we discuss what GRC is, why you need a GRC Strategy Roadmap, and how you can leverage a Roadmap to guide you through the GRC implementation journey.

Wherever you are in that journey, the roadmap will allow you to establish...

Read More

Visit us at the VMUG in Indianapolis

Stop by our booth at the VMware User Group conference. This year’s conference is being held at the Indianapolis Convention Center in downtown Indianapolis. They will be providing breakfast, lunch and conference materials.  View the full conference...

Read More

Circle City Con - Indianapolis

Cadre Information Security is proud to be a sponsor and exhibitor at the Circle City Con in Indianapolis. 

Stop by our booth at the Circle City Con security conference. We are co-hosting this year with Symantec, the global leader in next-generation...

Read More

CircleCity Crossroads - Indianapolis

Cadre Information Security is proud to be a sponsor and exhibitor at the CircleCity Crossroads. 

This is the first year that CircleCityCon, Infragard, and ISSA have joined together to create this extraordinary event for Information Security...

Read More

Visit us at Tech Pros 2018 in Pittsburgh PA

Cadre Information Security is proud to be a sponsor and exhibitor at the Tech Pros at Penn State Dickinson Law. 

Visit our booth on Thursday or Friday, May 24th and 25th, at Penn State Dickinson Law.  The conference begins each day at 9 am. Click ...

Read More

Internal use of SSL/TLS: Risks, Challenges, and Opportunities for Further Consideration

SSL is a ubiquitous technology introduced in 1994.  The use of SSL, and it’s descendant, TLS, is first and foremost based on established trust.  A trusted authority validates a domain name as belonging to a particular entity.  This trusted authority...

Read More

Do You Worry About Who Is Accessing Your Data?

Cadre Information Security is proud to be co-hosting an exclusive security event with SecurityScorecard.   

When: Friday, May 25th

Location: Cinemark Theatres, 6001 Canal Road, Valley View, OH 44125

Wondering who SecurityScorecard is?  Well come...

Read More

Be a Jedi by Protecting Your Galaxy!

Cadre Information Security is proud to be co-hosting an exclusive security event with Fortinet and Gemalto.   

When: Friday, May 25th

Location: Envision Cinemas, 4780 Cornell Road, Blue Ash, OH 45241

Protecting your Galaxy from the Death Star is...

Read More

Your ISP Potentially Knows EVERYTHING that you do through your Internet Connection

Q. Who knows more about your internet use then Facebook, Amazon or even your browser?

A. Your ISP and NOW they can collect and sell your internet usage information!

Q. How can you protect yourself?

A. Keep reading this blog!

Quietly last March,...

Read More

How to Legally Practice Social Engineering

Social Engineering is without question the most powerful and successful hacker skill of all time, but how can you become fluent enough in this skill to learn and defend against it if the practice is illegal?

If you want to learn a skill to protect...

Read More

Should we Fear the Amazon Echo or Other Smart Speakers in our Home?

Author: Tim O’Connor

I am a cyber security professional and when I tell some of my peers that I have several Amazon Echo smart speakers in my home and workshop they sometimes look at me like I just said Edward Snowden was my roommate or that I just...

Read More

Cadre Information Security is Hosting a Governance, Risk and Compliance Roadmap Strategy Workshop at Ruth’s Chris Steakhouse.

Luncheon – Louisville, KY  

Are you in compliance with regulatory requirements?  Join us on April 12th at Ruth’s Chris Steakhouse at 11:30am to meet our GRC team.

Come take a break from your daily work assignments to hear more about Governance, Risk...

Read More

HID Proximity Access Cards:  Unsafe at Any Speed!

Many workers are familiar with the venerable HID access card.  You present the card to a badge reader and the door opens.  The badge itself, about the same size as a credit card, identifies the holder to the access control system that controls door...

Read More

Don't Lose Face with your Friends over Facebook

Author: Tim O'Connor

You have likely been hearing about the personal privacy leakage court cases involving data mining your Facebook account and maybe even its link to “spy vs. spy” stuff like Russian election influence. You might have even heard...

Read More

Cadre Information Security is hosting a Happy Hour at The District Tap in Indianapolis

Ready for a nice cold beverage?  Join us on Thursday, March 1st at The District Tap to meet our local security team.   

Enjoy a great afternoon of networking with like-minded peers while sampling some food and beverages.  The goal is to introduce...

Read More

Cadre to Offer RSA Archer Solutions

Cadre Information Security has expanded its partnership with RSA, a Dell Technologies Company, and a leader in the enterprise Risk Management and Governance, Risk and Compliance (GRC) market.

Cadre is broadening its strategic role with RSA, by...

Read More

Cadre's Digital Training Classroom 

Cadre’s new upgraded classroom brings better than state-of-the-art security training for students at ANY LOCATION to our already advanced training solutions.

Students can now attend all of Cadre’s course offerings remotely without the expense of...

Read More

Benefits of a Virtual Chief Information Security Officer Service (vCISO)

By now you are probably aware of the advantages of using a virtual computer (VM) and how that compares with utilizing and operating a physical one.

A Virtual Chief Information Security Officer (vCISO), similar to a virtual machine, is a new service...

Read More

Security Awareness Evaluation - Don't Fall for the "Streetlight Effect!"

A policeman sees a drunk man searching for something under a streetlight and asks what the drunk has lost. He says he lost his keys and they both look under the streetlight together. After a few minutes the policeman asks if he is sure he lost them...

Read More

Cadre Now Offers Managed Services

When it comes to managing IT for your business, you can never have too much help.  That's why Cadre is now offering Managed Security Services. 

Maintaining and upgrading a security system requires a defined, comprehensive process for updating and...

Read More

Monitor the Security State of your Internal Network with Virtual Network Vulnerability Scanning

Keeping abreast of your network and infrastructure can be a daunting task. Vulnerabilities are much more than a nuisance, they leave your company open to attacks that can lead to serious consequences. Patching vulnerabilities, monitoring email...

Read More

What is GRC?

GRC stands for Governance, Risk and Compliance.

The Open Compliance and Ethics Group (OCEG) has published one of the most comprehensive GRC definitions. In its GRC Capability Model, Red Book, 2.0, the OCEG defines GRC as a system of people,...

Read More

Good vs. Evil:  Dealing with today's cyber threats

Cadre Information Security is proud to be co-hosting an exclusive security event with SentinelOne.   

When: Friday, November 3rd starting at 10:30am 

Location: Cobb Theatre, 7514 Bales Street, Liberty Township, OH 45069

SentinelOne’s security...

Read More

InfoSec Summit SSW-2017 Cleveland Ohio

Cadre Information Security is proud to be a sponsor and exhibitor at the Security Summit in Cleveland, Ohio. 

Read More

Data Connectors - Nashville

Cadre Information Security is proud to be a sponsor and exhibitor at the Data Connectors in Nashville. 

Read More

SecureWorld Cincinnati

Cadre Information Security is proud to be a sponsor and exhibitor at the SecureWorld Cincinnati.

Read More

Building CyberSecurity Awareness

October is National CyberSecurity Awareness Month (NCSAM)

This campaign was created as an effort to ensure Americans have the resources and information they need to be safe and more secure online. 

There's been a massive number of cyberattacks...

Read More

How to Encourage Your Team to use Stronger Passwords

If you work in any sort of IT/cyber security role, you know it’s imperative to be concerned with hacking. It’s scary out there, especially with increasing reports of organized cyber-criminals going after any sized company, not just the bigger...

Read More

What is Malware?

Malware is a portmanteau of "malicious" and "software". As the name implies, malware is created solely to harm and inconvenience people by corrupting devices and/or data. 

Read More

What is a value-added reseller?

A value-added reseller (VAR) is a company that takes an existing product and adds extra features and/or services to it. This is typically in order to sell an integrated product to end users as a turnkey solution. Value-added resellers can do just as...

Read More

Understanding Password Manager’s Risks and Rewards

These last several weeks have brought up a lot of interesting discussions around passwords and password management, both personally and in the enterprise. 

Read More

When a Technology Becomes a Security Control

As a Chief Information Security Officer (CISO) or Information Security manager, you have to make decisions on how to best mitigate and handle risks for your business.  

Read More

Small Vulnerabilities Can Lead To Catastrophic Results [Part 2]

Not all leaks are the result of malice.

In 2006, America On-Line (AOL) negligently published 20 million web queries from over 650,000 of its users. This simple accident resulted in an incalculable amount of brand damage to AOL, and it could have...
Read More

Small Vulnerabilities can lead to Catastrophic Results [part 1]

When it comes to security, most IT departments focus primarily on network and application security.

By now, we've all read news stories about vulnerabilities in various software and are familiar with the importance of preventing unwanted network...

Read More

It’s Not Fear Factor, it’s Multi-Factor

What is multi-factor authentication?Multi-Factor Authentication (MFA) is a method used to grant access to a computer or application. Of course the access is only granted after the user has provided a username and two types of authentication methods,...

Read More

5 Major Benefits of Security Assessments

Security assessments should be a part of any company’s security program. At a high level, they measure a company’s security posture against industry best practices, compliance requirements and industry frameworks.  It takes into consideration...

Read More

Encoding, Hashing, and Encryption: What’s the difference?

Encoding, hashing, and encrypting are common concepts applied and discussed when trying to secure data.  Many vendors claim to use strong encryption methods and standards, but it is necessary for a security team to assess whether it really is...

Read More

Your Single Source for Security Guidance

Your network is important to you and it's critically important to us.

Does alignment of business, organizational and technical goals seem impossible to you? 

Not to us. 

Since 1996, Cadre has been the single source for security guidance, enabling...

Read More

Inspecting Encrypted Network Traffic

Encrypted traffic is becoming increasingly prevalent on corporate networks.  

Read More

Taking Over Master Membership and Securing VRRP


Part 1 (No Firewall Module)

Instructions for setup are in the link above. You must install two firewalls and configure VRRP on both of them to act as a cluster.  The first part of this exercise is pure VRRP with no firewall module running.

Read More

Breach Mitigation: Will It Take a Village?

No one is immune from data breaches. We’ve witnessed department stores, hospitals, insurance companies, media giants, dating websites, the federal government and so many others in the news almost daily with yet another breach.

This dominated the...

Read More

Cadre's Story

Very few people were talking about network security when Cadre was formed back in late 1991. By most accounts, the first firewall was invented a year later, circa 1992, to the credit of multiple inventors. In the world of security technology, over...

Read More