Eric Parker

Eric Parker
Eric is an energetic principal engineer capable of meaningful customer-focused both technical and non-technical interactions. He is heavily focus on enterprise security with extensive experience in network user behavior analysis (UBA), log security monitoring, security architecture, orchestration, analysis, policy and implementation. Regularly meeting customer and corporate business needs. Always interested in finding new ways to integrate different ML &AI tools into meaningful, actionable events. The bleeding edge of the security landscape as it relates to monitoring, bots, fraud detection, account takeover, unauthorized user activity, and business logic abuse.

Recent Posts

What is incident response?

Posted by Eric Parker on Apr 15, 2021 5:30:00 AM

 

Creating an incident response program and team is the core of any strong cybersecurity program. According to one 2020 report, 7 million data records are compromised every day. With a better understanding of incident response, you can mature your security posture to reduce data breach risks.

Read More

Topics: cybersecurity, incident response

DNS and Email Security

Posted by Eric Parker on Nov 18, 2020 8:00:00 AM

Introduction

DNS is a widely used phonebook system on the Internet. It is used simply to query the IP address associated with a humanly readable and memorizable name. But it is a lot more than that as this article explains. If you have not yet read our previous article do so here: DNS and its Security Implications. In this blog we will talk about DNS from an Email Security perspective.

Read More

Topics: DNS, email, email security

URL scanning for new age security measures

Posted by Eric Parker on Oct 21, 2020 8:00:00 AM

It’s the URL, stupid (me)!


Consider a scenario. You are in a miserable situation where you accidentally clicked on some phishing link or scam URL. A long time ago, when the web was safe, and viruses, trojans, and worms were transmitted only by EXE or BIN files, we could rest assured that the virus scanner protected us.

Now, the web is the purveyor of all things good and evil. Smartphones have become the norm rather than the exception. The individual security measures (windows, IOS, etc.) are only as useful as there latest update, and maintaining the amount of tech we each possess up to date is difficult. But the most common denominator is the URL centric web. All devices have Internet access and thus are vulnerable to the latest threats.

Think of the email before spam abuse. There used to be open relays everywhere, and anyone could send emails using a 10 line shell script using SMTP command verbs. Today that is impossible since email abuse has turned people away from everyday email. Even when you need to use email for work, most of one's inbox is someone trying to sell you something or market something. Every piece of traffic that humans originated on the Internet has a URL, so let's look at new-age security measures to help protect you.

Read More

Topics: Cyber Security, Network Scanning, Network Security, url scanning