Adam Khan

All posts by Adam Khan

Adam Khan is the VP, Global Security Operations at Barracuda MSP. He currently leads a Global Security Team which consist of highly skilled Blue, Purple, and Red Team members. He previously worked over 20 years for companies such as Priceline.com, BarnesandNoble.com, and Scholastic. Adam's experience is focused on application/infrastructure automation and security. He is passionate about protecting SMBs from cyberattacks, which is the heart of American innovation.

Tales from the security operations center (SOC)

Tales from the security operations center (SOC)

With the frequency and variety of cyberattacks increasing daily, the need for comprehensive security measures has never been more critical. For analysts staffing a security operations center (SOC) for a global extended detection and response (XDR) service, each day brings...

/ July 4, 2024
Spring-cleaning checklist for defending against ransomware

Spring-cleaning checklist for defending against ransomware

Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

/ April 5, 2024 / 12 Comments
evolution of cybersecurity
Evolution of cybersecurity: The rise of XDR in the 2020s

Evolution of cybersecurity: The rise of XDR in the 2020s

As part of our 5-part series on the evolution of cybersecurity, the fifth and final entry highlights the need for manageability and visibility as the frequency of cyberattacks increased sharply, coupled with a shortage of cybersecurity professionals, and the growth...

/ January 31, 2024
Beyond the horizon: Growth of cyberattacks in the 2010s

Beyond the horizon: Growth of cyberattacks in the 2010s

As part of our 5-part series on the evolution of cybersecurity, check out our fourth article below that covers IoT devices and vulnerabilities to Bitcoin-driven ransomware in the 2010s. During the 2000s, we saw the growing arms race between security...

/ January 2, 2024
Essential tips and strategies for protecting against ransomware

Essential tips and strategies for protecting against ransomware

In September, MGM Resorts faced system outages (affecting hotel room keycard systems and slot machines) and service disruptions at its Las Vegas properties. Caesars Entertainment also reported suffering a data breach that revealed its loyalty program members’ Social Security and driver’s license...

/ November 16, 2023
security transformation
The dawn of real-time defense: security transformation in the 2000s

The dawn of real-time defense: security transformation in the 2000s

As part of our 5-part series on the evolution of cybersecurity, check out our third article below that covers how the beginning of the 21st century witnessed a relentless battle between cybercriminals and security experts, fueled by the rapid evolution of...

/ November 14, 2023
Guarding the Gates: The rise of network protection in the 1990s

Guarding the Gates: The rise of network protection in the 1990s

As part of our 5-part series on the evolution of cybersecurity, check out our second article below that covers how the security industry laid the groundwork for a more holistic approach to cybersecurity. We are continuing our series that explores...

/ October 23, 2023
security
From Basics to Breakthroughs: Evolution of IT security in the 1980s

From Basics to Breakthroughs: Evolution of IT security in the 1980s

As part of our 5-part series on the evolution of cybersecurity, check out our first article below that covers how War Games and Worms led to the creation of the first cybersecurity efforts in the 1980s. While cybersecurity is a multibillion-dollar...

/ September 28, 2023
Bend, don’t break: How attackers and defenders learn from each other

Bend, don’t break: How attackers and defenders learn from each other

For more than 30 years, cyber attackers and security teams have battled it out across the digital landscape, one side looking for gaps and flaws to target, the other side fixing and protecting them. The pace of the conflict is...

/ June 21, 2023
5 Levels of security operations center maturity

5 Levels of security operations center maturity

For MSPs that offer cybersecurity services, the security operations center (SOC) has emerged as a critical strategy for protecting client networks. While security software tools can help prevent some types of attacks, the SOC offers the threat detection, investigation and...

/ June 7, 2023 / 9 Comments