top of page

The Burk Blog


Don’t Overlook These 3 Technology Budget Categories
Are you considering all the necessary technology categories when planning your annual budget?

Michael Trotter-Lawson
Dec 15, 20223 min read


Hacking, Hackers, and Hollywood
Let’s talk about hacking, the way it’s depicted, and how those depictions compare with reality.

Michael Trotter-Lawson
Nov 2, 20225 min read


What You Need to Know About the Internet of Things
The internet of things, often abbreviated as IoT, refers to objects that have the capacity to connect to each other and/or the internet.

Michael Trotter-Lawson
Sep 23, 20225 min read


Identity and Access Management
Identity management, also known as identity and access management, is such an important aspect of modern internet security.

Michael Trotter-Lawson
Aug 22, 20225 min read


The Data Centric Security Model
There is no debate regarding the purpose of Information Services security. IS Security exists to safeguard data.

Ben Lawson
Aug 10, 202213 min read


Dark Web Monitoring Explained
The Dark Web is a scary place. Even the name sounds very ominous.

Ben Lawson
Aug 3, 20227 min read


Product Spotlight | Sentinel One
SentinelOne is an advanced EDR and threat hunting solution that delivers real-time visibility relevant insights.

Tyler Rasnake
Jul 29, 20222 min read


Does the Vendor Matter? – Smartphone Security in a Threat Filled World
Recently I was asked to discuss the cybersecurity risks associated with smartphones and the possibility that those devices could be...

Ben Lawson
Jul 27, 20228 min read
bottom of page


