Nexum News
Below are resources from the experts at Nexum.
Most Recent Resources
Juniper Announces Wi-Fi 7 Access Points
Nexum’s engineering team highlights Juniper’s new Wi-Fi 7 AP47 as a game-changer, offering faster speeds, quad radios, and enhanced IoT capabilities. With dual 10Gbps interfaces and AI-driven Wi-Fi 7 support, these access points are designed for cutting-edge network performance.
AI-Native Now
Join Juniper Networks on June 5th for a LinkedIn Live exclusive discussion on “Leveraging AIOps for Maximum Impact.”
Wireless LAN Professionals Conference 2024
Allyn Crowe, Senior Security Engineer, attended the Wireless LAN Professionals conference. If you work on wireless networks, you really need to try and get to this conference.
Acronym Series: BiDi
Nexum’s expert engineers define popular topics, such as Bidirectional (BiDi), in our Acronym Series.
Acronym Series
In this series, our engineers define some of the industry’s most widely used terms.
Acronym Series Introduction
Our new Acronym Series hopes to help our readers navigate the acronym-filled waters of IT discussions. Each article will give the acronym, the shortened phrase, a brief definition, and a little information to help you understand it.
Acronym Series: BiDi
Nexum’s expert engineers define popular topics, such as Bidirectional (BiDi), in our Acronym Series.
Advanced Persistent Threat
In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics, like Advanced Persistent Threat (APT).
Application Programming Interface
Nexum’s expert engineers define popular topics, such as Application Programming Interface (API), in our Acronym Series.
Direct Attach Cable
Nexum’s expert engineers define popular topics, such as Direct Attach Cable (DAC), in our Acronym Series.
Endpoint Detection Response
Nexum’s expert engineers define popular topics, such as Endpoint Detection and Response (EDR), in our Acronym Series.
Mean Time to Detect and Mean Time to Respond
In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics, like Mean Time to Detect (MTTD) and Mean Time to Response (MTTR).
Request for Comments
In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics, like Request for Comments (RFC).
Secure Sockets Layer
In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics, like Secure Sockets Layer (SSL).
Transport Layer Security
Nexum’s expert engineers define popular topics, like Transport Layer Security (TLS), in our Acronym Series.
API Security Series
In this Application Programming Interface (API) security series, we review how to use these interfaces and exploit them.
Open Systems, Open Threats
In this API Security Series, we will review how to use these interfaces, exploit them, and prevent an organization’s name from appearing on the news.
Automation Series
The topic on everyone’s minds right now: Automation.
Work Smarter Not Harder with Automation
This new series will focus on IT automation and how it can help organizations with the familiar desire to “do more with less.”
Event News
AI-Native Now
Join Juniper Networks on June 5th for a LinkedIn Live exclusive discussion on “Leveraging AIOps for Maximum Impact.”
Wireless LAN Professionals Conference 2024
Allyn Crowe, Senior Security Engineer, attended the Wireless LAN Professionals conference. If you work on wireless networks, you really need to try and get to this conference.
Black Hat 2023 and DEF CON 31: Two Conventions, One Long Week
The Nexum team attended Black Hat 2023 and DEF CON 31 conferences in Las Vegas. Check out this post about their experiences and some guidance on the differences between the two events.
Nexum at Red Hat Summit
Nexum’s Peter Scudamore and George Grzyb talk about workshops introducing automation to network engineers and other tools that will help mitigate some of those after-hours calls at Red Hat Summit.
Nexum at AnsibleFest
Check out this event recap from the Nexum team who attended AnsibleFest. This post includes our takeaways and other event information.
A Tale of Two Conventions: Black Hat and DEF CON 30
Earlier this month, Ron Temske, Nexum’s VP of Strategy, attended the Black Hat USA and DEF CON 30 conventions in Las Vegas. Here is a recap of his experiences, including meaningful takeaways from both and recommendations for attending in the future.
Nexum Summer Summit 2022 Recap
In July, Nexum held our first annual Summer Summit event. It was a wonderful opportunity to get a significant portion of the company together in Chicago to reconnect, learn, and have a lot of fun.
Nexum at Juniper AI in Action
We attended Juniper’s AI in Action event in Las Vegas recently. Here are some post event thoughts from Allyn Crowe, Senior Security Engineer.
Nexum at Central Ohio ISSA InfoSec Summit
Nexum at Central Ohio ISSA InfoSec Summit Written by: Scott Hammond, Senior Security EngineerConnect with us on LinkedIn Recently several members of Team Nexum attended
2021 Nexum Security Open
2021 Nexum Security Open: A Tee-rific Event Putter late than never! It was fantastic to finally be able to get together in person last week
Ransomware Series
Ransomware is on the rise. Dive further into this topic with Nexum’s engineers.
Let’s Play a Game
In the final post of our Ransomware Series, we’ll examine deception technology, how it has evolved, and how to tilt the odds in your favor to win the cybersecurity game.
Evolved Email Security & NGFW Help Prevent Ransomware
Email security and NGFW may seem like standard practice, but as these technologies evolve, so do the threats against them, like ransomware.
Ransomware “Does Not Succeed” with DNS
Part 3 of our Ransomware Series focuses on a vital Internet technology that is an entry point for ransomware and malware propagation: Domain Name System (DNS).
Prevent Ransomware with SASE
There are three technologies that can help prevent ransomware: Cloud access security broker (CASB), secure web gateway (SWG), and data loss prevention (DLP). These components have converged into a single solution for what has now been coined the secure access service edge (SASE) architecture.
Ransomware Disruption Overview
Ransomware can be very disruptive for both businesses and individuals alike. We have all seen the latest examples in the news concerning ransomware campaigns.
Nexum Insights
Each quarter, the managed security team at Nexum shares insights from our first*defense®
Security and Network Operations Command Centers (SNOCC).
Enterprise Logging Best Practices
Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, we decided to share some general logging best practices that are likely to benefit every organization.
SNOCC Quarterly Threat Update Q2 2023
Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, we discuss detection challenges and the importance of context.
SNOCC Quarterly Threat Update Q1 2023
Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, macro trends include vulnerabilities in Exchange, socially engineered phishing, IoT, Edge and infrastructure devices, and geo-blocking.
Strategy Series
Updates on the state of the industry
and commentary on crucial topics that may shift your thinking.
Visibility Matters
Why has visibility become so difficult? Where do you start to build your strategy? We’ll also discuss IoT devices, ASM, and CSPM.
A Business Case for Being a Good Leader
Cybersecurity professionals are facing high rates of burnout. Many feel overworked and undervalued. In this Strategy Series post, Ron Temske makes the case for being a good leader.
Artificial Intelligence – Savior or Skynet?
OpenAI’s ChatGPT is both amazing and terrifying. Let’s look at the difference between AI and Machine Learning, the benefits, and concerns.
The Role of Security
Nexum’s VP of Strategy, Ron Temske, considers the function of security and how it has evolved. And how security should be incorporated into strategic plans.
Visibility Series
What is really in your environment, and more importantly, how can you secure it?
Learn more through our Visibility Series with Nexum’s Security Specialist, Sarah Lantz.
Documentation from Visibility
In Part 4 of our Visibility Series, we’ll wrap things up by discussing why documentation matters and how visibility helps with operations.
Network Alerting
One of the primary things Information Technology (IT) and security teams continue to contend with are alerts. Every system has the capability to generate an alert. Is it some sort of security alert? Some sort of uptime alert? Perhaps an alert indicating that too many alerts have been generated in too short a time? Either way, the volume of alerts likely involves headaches for everyone.
Flashlight on Shadow IT
“You cannot secure what you do not know.” I frequently see iterations of this phrase when it comes to cybersecurity and visibility. When a security team looks to gain insight into what is being used in their network, they won’t be able to secure what they can’t see or are not aware of. It’s here that the buzzword of Shadow IT (Information Technology) is also commonly thrown around. You can think of Shadow IT as the thing that you do not know is on the network – and therefore cannot secure.
Tackling the Visibility Monolith
Until recently, I had only thought of visibility as a monolithic and all-encompassing function – a “catch all” that various teams dive into when they need a clear view of what is occurring in their network. However, I’ve learned that different teams need different views into how their systems communicate across the entire enterprise. As teams grapple with the concept of what is in the environment, and what needs to be secured, “visibility” is the word everyone comes back to.
Partner Resources
Updates and news about our technology partners
Juniper Announces Wi-Fi 7 Access Points
Nexum’s engineering team highlights Juniper’s new Wi-Fi 7 AP47 as a game-changer, offering faster speeds, quad radios, and enhanced IoT capabilities. With dual 10Gbps interfaces and AI-driven Wi-Fi 7 support, these access points are designed for cutting-edge network performance.
Artificial Intelligence in Enterprise Networking
What is the difference between AI and ML? How do you know if an AI system is correct and helpful? Check out this free guide.
Wi-Fi 6 and 6E at a Glance
A free guide highlighting some of the improvements of Wi-Fi 6 over the “last” major version of Wi-Fi: Wi-Fi 5 or 802.11ac, and what Wi-Fi 6E brings to Wi-Fi 6.
Nexum at Juniper AI in Action
We attended Juniper’s AI in Action event in Las Vegas recently. Here are some post event thoughts from Allyn Crowe, Senior Security Engineer.
Juniper Wired and Wireless Wednesday
Juniper Wired and Wireless WednesdaysPartner Demo Are you ready to reap the benefits of intent-based networking in your data center? Join Nexum to learn how
Palo Alto Networks BPA+ Review
Palo Alto Networks BPA+ ReviewPartner Update Written by: Scott Hammond, Senior Security Engineer Connect with Scott on LinkedIn Not long ago, our partner, Palo Alto
Juniper Mist Takes On SD-WAN
Nexum, Inc.’s technology partner Juniper recently announced it was adding support for the SSR (Session Smart Routing) product line to its Mist portal. But beyond including another part of the Juniper family in the portal, why is this a big deal? And how does this help clients who may just be getting started with their Mist journey? How does this help clients run their network more easily in the long run?
Juniper Networks: A Leader in 2021 Gartner Magic Quadrant
This week, Gartner released the 2021 Magic Quadrant for Enterprise Wired and Wireless LAN Infrastructure and Juniper Networks was recognized as a Leader for the second year in a row, positioned furthest in both Ability to Execute and Completeness of Vision. This is, without a doubt, one of the most special career moments for Mist and a great example of what startups can achieve with an amazing team.
A Look Back (and forward) at Juniper’s AI-Driven SD-WAN Journey
Prior to its acquisition by Juniper Networks, 128 Technology celebrated each year on 1/28 – and together, we’re keeping the tradition alive! This anniversary is especially exciting as it’s been just over one year since the companies came together. So, it’s the perfect occasion to look back at what has been achieved in this short period of time and discuss the more exciting things that are still yet to come.
Assuring Excellent User Experiences with AI-Driven SD-WAN
Over the past few years, it goes without saying that the world has experienced a great deal of ups and downs. Companies have had to adapt to remote work environments, hybrid work environments and everything in between. Through it all, one thing has proven its importance – the need to provide an excellent user experience no matter where the workforce is located.
All Nexum Resources
Juniper Announces Wi-Fi 7 Access Points
Nexum’s engineering team highlights Juniper’s new Wi-Fi 7 AP47 as a game-changer, offering faster speeds, quad radios, and enhanced IoT capabilities. With dual 10Gbps interfaces and AI-driven Wi-Fi 7 support, these access points are designed for cutting-edge network performance.
AI-Native Now
Join Juniper Networks on June 5th for a LinkedIn Live exclusive discussion on “Leveraging AIOps for Maximum Impact.”
Wireless LAN Professionals Conference 2024
Allyn Crowe, Senior Security Engineer, attended the Wireless LAN Professionals conference. If you work on wireless networks, you really need to try and get to this conference.
Acronym Series: BiDi
Nexum’s expert engineers define popular topics, such as Bidirectional (BiDi), in our Acronym Series.
Enterprise Logging Best Practices
Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, we decided to share some general logging best practices that are likely to benefit every organization.
Black Hat 2023 and DEF CON 31: Two Conventions, One Long Week
The Nexum team attended Black Hat 2023 and DEF CON 31 conferences in Las Vegas. Check out this post about their experiences and some guidance on the differences between the two events.
Artificial Intelligence in Enterprise Networking
What is the difference between AI and ML? How do you know if an AI system is correct and helpful? Check out this free guide.
Wi-Fi 6 and 6E at a Glance
A free guide highlighting some of the improvements of Wi-Fi 6 over the “last” major version of Wi-Fi: Wi-Fi 5 or 802.11ac, and what Wi-Fi 6E brings to Wi-Fi 6.
Security Operations Guide
MDR and SOC and MSSP and SIEM and EDR and XDR and SOAR, Oh My! This free guide will examine these terms, their meaning, and how they relate to each other.
Open Systems, Open Threats
In this API Security Series, we will review how to use these interfaces, exploit them, and prevent an organization’s name from appearing on the news.
Visibility Matters
Why has visibility become so difficult? Where do you start to build your strategy? We’ll also discuss IoT devices, ASM, and CSPM.
Prowler: Open-Source Tool to Secure Your Cloud Environment
Prowler is an open-source security tool that can help proactively harden cloud services not managed by the CSP, validate compliance against third-party audit findings, and support audits and assessments of cloud environments.
Direct Attach Cable
Nexum’s expert engineers define popular topics, such as Direct Attach Cable (DAC), in our Acronym Series.
Mean Time to Detect and Mean Time to Respond
In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics, like Mean Time to Detect (MTTD) and Mean Time to Response (MTTR).
Advanced Persistent Threat
In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics, like Advanced Persistent Threat (APT).
Nexum at Red Hat Summit
Nexum’s Peter Scudamore and George Grzyb talk about workshops introducing automation to network engineers and other tools that will help mitigate some of those after-hours calls at Red Hat Summit.
A Business Case for Being a Good Leader
Cybersecurity professionals are facing high rates of burnout. Many feel overworked and undervalued. In this Strategy Series post, Ron Temske makes the case for being a good leader.
SNOCC Quarterly Threat Update Q2 2023
Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, we discuss detection challenges and the importance of context.
Let’s Play a Game
In the final post of our Ransomware Series, we’ll examine deception technology, how it has evolved, and how to tilt the odds in your favor to win the cybersecurity game.
Request for Comments
In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics, like Request for Comments (RFC).
Work Smarter Not Harder with Automation
This new series will focus on IT automation and how it can help organizations with the familiar desire to “do more with less.”
Wireless LAN Professionals Conference 2023
Nexum attended this year’s Wireless LAN Professionals Conference (WLPC) in Phoenix, AZ. Check out the recap!
SNOCC Quarterly Threat Update Q1 2023
Each quarter, the managed security team at Nexum shares insights from our first*defense SNOCC. In this post, macro trends include vulnerabilities in Exchange, socially engineered phishing, IoT, Edge and infrastructure devices, and geo-blocking.
DNS Privacy (DoT & DoH) & Enterprise Security
DNS privacy and security are two considerations with competing goals. DoT and DoH undermine enterprise security for the benefit of privacy. ECS erodes privacy for distributed cloud-based resources. Let’s look at how these standards work and your options in defense or offense.
Evolved Email Security & NGFW Help Prevent Ransomware
Email security and NGFW may seem like standard practice, but as these technologies evolve, so do the threats against them, like ransomware.
Artificial Intelligence – Savior or Skynet?
OpenAI’s ChatGPT is both amazing and terrifying. Let’s look at the difference between AI and Machine Learning, the benefits, and concerns.
Application Programming Interface
Nexum’s expert engineers define popular topics, such as Application Programming Interface (API), in our Acronym Series.
Ransomware “Does Not Succeed” with DNS
Part 3 of our Ransomware Series focuses on a vital Internet technology that is an entry point for ransomware and malware propagation: Domain Name System (DNS).
Nexum at AnsibleFest
Check out this event recap from the Nexum team who attended AnsibleFest. This post includes our takeaways and other event information.
The Role of Security
Nexum’s VP of Strategy, Ron Temske, considers the function of security and how it has evolved. And how security should be incorporated into strategic plans.
Transport Layer Security
Nexum’s expert engineers define popular topics, like Transport Layer Security (TLS), in our Acronym Series.
Endpoint Detection Response
Nexum’s expert engineers define popular topics, such as Endpoint Detection and Response (EDR), in our Acronym Series.
Cloud Networking: From Magic Smoke to Black Boxes
Cloud networking was once hailed as the savior of our industry, but security and networking continue to find challenges with managing and scaling. Read more about how organizations are adapting to the black box of cloud networking.
A Tale of Two Conventions: Black Hat and DEF CON 30
Earlier this month, Ron Temske, Nexum’s VP of Strategy, attended the Black Hat USA and DEF CON 30 conventions in Las Vegas. Here is a recap of his experiences, including meaningful takeaways from both and recommendations for attending in the future.
Acronym Series Introduction
Our new Acronym Series hopes to help our readers navigate the acronym-filled waters of IT discussions. Each article will give the acronym, the shortened phrase, a brief definition, and a little information to help you understand it.
Nexum Summer Summit 2022 Recap
In July, Nexum held our first annual Summer Summit event. It was a wonderful opportunity to get a significant portion of the company together in Chicago to reconnect, learn, and have a lot of fun.
Documentation from Visibility
In Part 4 of our Visibility Series, we’ll wrap things up by discussing why documentation matters and how visibility helps with operations.
Zero Trust Network Access
In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics. Next up, Zero Trust Network Access (ZTNA).
Nexum at Juniper AI in Action
We attended Juniper’s AI in Action event in Las Vegas recently. Here are some post event thoughts from Allyn Crowe, Senior Security Engineer.
Secure Sockets Layer
In our Acronym Series, Nexum’s expert engineers define the industry’s most popular topics, like Secure Sockets Layer (SSL).
CISO Guide to Ransomware
Our partner Abnormal Security is disrupting the email security market. Receive your free CISO Guide to Ransomware – How It Starts via Email and How to Prevent It.
Prevent Ransomware with SASE
There are three technologies that can help prevent ransomware: Cloud access security broker (CASB), secure web gateway (SWG), and data loss prevention (DLP). These components have converged into a single solution for what has now been coined the secure access service edge (SASE) architecture.
Nexum at Central Ohio ISSA InfoSec Summit
Nexum at Central Ohio ISSA InfoSec Summit Written by: Scott Hammond, Senior Security EngineerConnect with us on LinkedIn Recently several members of Team Nexum attended the 15th annual Central Ohio ISSA InfoSec Summit in rainy Columbus, Ohio. As a well-respected event for security-minded professionals to gather and discuss today’s critical
20 Years of Security
Founded in April of 2002, we are proud to celebrate our 20th anniversary. This post includes quotes from Founder and CEO of Nexum and a Back in 2002 infographic.
The Issue With Open-Source Code Utilization
Due to ongoing geopolitical events, particularly the Russia-Ukraine conflict, some individuals have begun to “poison” major open-source projects to try to cause damage. There were developers (cyber-activists) that chose to introduce code specifically targeting computers in Russia and Belarus.
Attack Observations Since the Russian Invasion of Ukraine
Nearly a month has passed since the start of the Russian invasion of Ukraine. Before this, the “Cold War” of cyberattacks has consisted of plenty of nation-state-sponsored activity against Western targets. But until now, this activity has not been a weaponized component in an active physical conflict with Western countries (whether direct or, in this case, by proxy).
Network Alerting
One of the primary things Information Technology (IT) and security teams continue to contend with are alerts. Every system has the capability to generate an alert. Is it some sort of security alert? Some sort of uptime alert? Perhaps an alert indicating that too many alerts have been generated in too short a time? Either way, the volume of alerts likely involves headaches for everyone.
Critical Vulnerability Alert: Log4j
Critical Vulnerability Alert: Log4j This page will be updated as additional information is released. Last Updated: December 20, 12:00pm EST On December 10, National Institute of Standards and Technology (NIST) issued a Common Vulnerabilities and Exposures (CVE) for a vulnerability in Log4j. This vulnerability when exploited can lead to the attacker having the ability
Flashlight on Shadow IT
“You cannot secure what you do not know.” I frequently see iterations of this phrase when it comes to cybersecurity and visibility. When a security team looks to gain insight into what is being used in their network, they won’t be able to secure what they can’t see or are not aware of. It’s here that the buzzword of Shadow IT (Information Technology) is also commonly thrown around. You can think of Shadow IT as the thing that you do not know is on the network – and therefore cannot secure.
Ransomware Disruption Overview
Ransomware can be very disruptive for both businesses and individuals alike. We have all seen the latest examples in the news concerning ransomware campaigns.
2021 Nexum Security Open
2021 Nexum Security Open: A Tee-rific Event Putter late than never! It was fantastic to finally be able to get together in person last week with some of our partners, clients, and new friends at Seven Bridges Golf Club outside of Chicago, IL. We hit the greens on a gorgeous
Tackling the Visibility Monolith
Until recently, I had only thought of visibility as a monolithic and all-encompassing function – a “catch all” that various teams dive into when they need a clear view of what is occurring in their network. However, I’ve learned that different teams need different views into how their systems communicate across the entire enterprise. As teams grapple with the concept of what is in the environment, and what needs to be secured, “visibility” is the word everyone comes back to.
Why Nexum first*defense?
Why Nexum first*defense®? Optimize your resources, defend your investments, and take back your network with Nexum first*defense, our suite of managed and monitored services. We know it’s a constant struggle to find the necessary resources to run your network security operations effectively. Nexum can augment your team’s operations by monitoring
Nexum Recognized on CRN’s 2021 MSP500 List
Chicago, IL – Nexum, Inc., a leader in networking and cybersecurity solutions announced today that CRN®, a brand of The Channel Company has named Nexum® to its 2021 Managed Service Provider (MSP) 500 list in the Security 100 category. This popular list identifies North American solution providers that deliver operational
Press Releases
For press inquiries, please contact pr@nexuminc.com
Nexum, Inc. Announces New Technology Partner vArmour
CHICAGO, IL, March 21, 2022 – Nexum, Inc., a leader in networking and cybersecurity solutions, announced today that vArmour has joined its growing list of exceptional technology partners.
Nexum, Inc. to Offer Versa Networks SASE
CHICAGO, IL, March 9, 2022 – Nexum, Inc., a leader in networking and cybersecurity solutions, announced today that Versa Networks, a secure access service edge (SASE) leader, is now part of its growing list of exceptional technology partners. Nexum will now offer Versa SASE and Versa secure software-defined wide area network (SD-WAN) to its customers.
Nexum, Inc. Announces Security Automation Partnership with Swimlane
CHICAGO, IL, February 28, 2022 – Nexum, Inc., a leader in networking and cybersecurity solutions, announced today the addition of Swimlane, a top provider of low-code security automation, to the company’s growing list of exceptional technology and cybersecurity partners.
Nexum, Inc. Announces AppOmni as New Technology Partner
CHICAGO, IL, February 24, 2022 — Nexum, Inc., a leader in networking and cybersecurity solutions, announced today that AppOmni, a top provider of SaaS Security, has joined its growing list of exceptional technology partners.
Nexum, Inc. Recognized on CRN’s 2022 MSP 500 List
Nexum®, a leader in networking and cybersecurity solutions, announced today that it has again been named to the 2022 Managed Service Provider (MSP) 500 list in the Security 100 category by CRN® (a brand of The Channel Company).