top of page

The Burk Blog


Hacking, Hackers, and Hollywood
Let’s talk about hacking, the way it’s depicted, and how those depictions compare with reality.

Michael Trotter-Lawson
Nov 1, 20225 min read


What You Need to Know About the Internet of Things
The internet of things, often abbreviated as IoT, refers to objects that have the capacity to connect to each other and/or the internet.

Michael Trotter-Lawson
Sep 22, 20225 min read


Identity and Access Management
Identity management, also known as identity and access management, is such an important aspect of modern internet security.

Michael Trotter-Lawson
Aug 21, 20225 min read


The Data Centric Security Model
There is no debate regarding the purpose of Information Services security. IS Security exists to safeguard data.

Ben Lawson
Aug 9, 202213 min read


Dark Web Monitoring Explained
The Dark Web is a scary place. Even the name sounds very ominous.

Ben Lawson
Aug 2, 20227 min read


Product Spotlight | Sentinel One
SentinelOne is an advanced EDR and threat hunting solution that delivers real-time visibility relevant insights.

Tyler Rasnake
Jul 28, 20222 min read


Does the Vendor Matter? – Smartphone Security in a Threat Filled World
Recently I was asked to discuss the cybersecurity risks associated with smartphones and the possibility that those devices could be...

Ben Lawson
Jul 26, 20228 min read
bottom of page


