Splunk is not a tool, it is a platform on which tools are built. When is Splunk is implemented correctly it completely changes the business processes in place. If day to day activities are not changed after Splunk is in place then it was a failure. One of the many ways that Splunk can change […]
About Cody Jackson
Cody Jackson is a leader in the management and design of secure wired and wireless networks. He performs engineering assessments for a variety of commercial solutions. He helps CISOs, IT Specialists, and Security Analysts secure network and enterprise data.
Cody's engineering networking and security expertise broaden AQUILA’s ability to service organizations. Before AQUILA, Cody was a Computer and Information Security Specialist on the Los Alamos National Laboratory Security Architecture and Application Development team. He also worked as an IT Specialist at Western New Mexico University.
Cody earned a Master of Science in Information Systems & Assurance from UNM. He received an MBA and a B.S. in History and Math from Western New Mexico University.
Entries by Cody Jackson
I read this morning that Taos Public Schools were hit with a widespread ransomware attack that crippled their network. I do not know how the attack was executed or spread but often these attacks are done via phishing emails or embedded malicious code in benign websites.
One of the key areas we can automate our defensive posture is understanding how the network we are defending looks. One of my SANS instructors once said: “you cannot protect what you don’t know about.”
Cybersecurity is an ever-increasing and advancing arms race. The attackers and threat actors are constantly harnessing new technology and techniques to increase their return on investment. As the defenders of our corporate, public, and private networks, we must do the same. Automation has long been a fear of every worker however as IT professionals we […]
APIs (Application Programming Interface) have become an increasingly important tool in IT. As businesses have become more reliant on connecting their business applications with each other and third-party tools a weak point has emerged in IT infrastructure.