“Elevating Your Vantage Point”: The Importance of Evaluating Your Current Cybersecurity Posture

In our recent webinar, “Elevating Your Vantage Point: The State of Your Current Cybersecurity Posture,” Myriad’s consulting solution architect Michael Morganelli is joined by Heather Axworthy, Senior Cybersecurity Engineer at Palo Alto Networks, to discuss the importance of understanding your current cybersecurity posture, as well as best practices. In this part 2 of a 3-part series, “Elevating Your Vantage Point” helps viewers define the gaps that exist between a security posture’s current state and its ideal state.

The presentation starts with an overview of the threat landscape, how it has evolved in terms of both method of attack and who is conducting these attacks, and how it plays a role in evaluating your current infrastructure. After providing a breakdown of the latest facts and figures regarding the legal and cleanup costs of a breach to an organization, Axworthy breaks down the less tangible costs of a breach, including reputation damage and supply chain interruption. The correlation between the number of breaches businesses report each year and workforces becoming more global, remote and mobile is also described. Axworthy discusses how to apply these findings to planning your cybersecurity strategy.

Next, Morganelli gives reasons why visibility may be lacking within your infrastructure before talking about tool fatigue, a common pitfall within the tech industry, and the problems that arise when disparate systems are not able to communicate with each other. He also sheds light on the three important types of tools to expedite the process of defining your current state, how to ensure the right people are involved, and strategies to get all stakeholders to speak a common language. Before a Q&A session, Morganelli and Axworthy touch upon the right questions to ask when choosing a cybersecurity partner.

To view the webinar in its entirety, visit: https://go.myriadsupply.com/CurrentStateWebinar_Recording. Be sure to stay tuned for the third and final part of our webinar summer series, “Agile Project Management for Cybersecurity 101” on September 26th.

Myriad Supply Named to Inc. 5000 List for Tenth Year

New York, NY, August 15th, 2018 – Myriad Supply, a cybersecurity consultancy and integrator, announced today it has ranked #3807 on Inc. Magazine’s 38th annual Inc. 5000 list.

“Earning a place on the Inc. 5000 for the tenth time is a tremendous achievement,” said Andrew Fisher, Myriad’s founder and CEO. “Year over year, Myriad has embraced the philosophy of constant improvement, focusing on providing industry-leading security offerings and delivering exceptional customer service.”

Of the tens of thousands of companies that have applied to the Inc. 5000 over the years, only a fraction have made the list more than once; a mere half a percent have made the list 10 times. Myriad has grown an impressive 95 percent over the last three years. Companies that made the list, on average, have grown six-fold since 2014, a factor calculated into Myriad’s current ranking.

“If your company is on the Inc. 5000, it’s unparalleled recognition of your years of hard work and sacrifice,” says Inc. editor in chief James Ledbetter. “The lines of business may come and go or come and stay. What doesn’t change is the way entrepreneurs create and accelerate the forces that shape our lives.”

Not only have the companies on the 2018 Inc. 5000 been very competitive within their markets, but the list as a whole shows staggering growth compared to prior lists. The 2018 Inc. 5000 achieved an astounding three-year average growth of 538.2 percent, and a median rate of 171.8 percent. The Inc. 5000’s aggregate revenue was $206.1 billion in 2017, accounting for 664,095 jobs over the past three years.

The complete Inc. 5000 list is highlighted in the September issue of Inc., available on newsstands August 15, and can be viewed online at www.inc.com/inc5000.

 

About Myriad Supply  

Myriad Supply is a cybersecurity consultancy and global provider of hardware and software solutions from top manufacturers. With a security-first approach, Myriad guides enterprises to define, design, and implement business-critical technology improvements within the areas of security, SDN, mobility, and cloud. To learn more, visit www.MyriadSupply.com or email hello@myriadsupply.com.

About Inc. Media

Founded in 1979 and acquired in 2005 by Mansueto Ventures, Inc. is the only major brand dedicated exclusively to owners and managers of growing private companies, with the aim to deliver real solutions for today’s innovative company builders. Winner of the National Magazine Award for General Excellence in both 2014 and 2012. Total monthly audience reach for the brand has grown significantly from 2,000,000 in 2010 to over 15,000,000 today. For more information, visit www.inc.com.

Myriad Supply Contact:
Kirsten Gonzalez
Myriad Supply
(646) 795-6047
kgonzalez@myriadsupply.com

Inc. Magazine Contact:
Drew Kerr
Inc. Media
212-849-8250
dkerr@mansueto.com

Myriad Supply Named to CRN’s 2018 Fast Growth 150 List

New York, NY, August 6th, 2018 – Myriad Supply, a cybersecurity consultancy and integrator, announced today that it placed #113 on CRN’s 2018 Fast Growth 150 list. 

 “It’s our fourth consecutive year and we couldn’t be more excited about our inclusion on the prestigious CRN Fast Growth 150 list,” said Andrew Fisher, Myriad Supply’s Founder and CEO. “Our ranking is a testament of Myriad’s dedication to our clients’ ongoing security needs, our domain expertise, and our flexibility to support the emerging trends in the market.” 

The Fast Growth 150 is CRN’s annual ranking of North America-based technology integrators, solution providers and IT consultants with gross sales of at least $1 million that have experienced significant economic growth over the past two years. The 2018 list is based on an increase of gross revenue between 2015 and 2017. The companies recognized this year represent a remarkable combined total revenue of more than $50 billion. 

“CRN’s 2018 Fast Growth 150 list features companies that are growing in an ever-changing, challenging market,” said Bob Skelley, CEO of The Channel Company. “As traditional solution providers are moving towards a services-focused business model, this extraordinary group have been able to successfully adapt; outperforming competitors and proving themselves as channel leaders. We are pleased to recognize these organizations and look forward to their continued success.”

Since 2009, only 13 companies have achieved four consecutive years on the Fast Growth 150 list, marking Myriad the 14th company to achieve this milestone. Myriad Supply placed #113 on the 2018 ranking with a two-year growth rate of 38.79%. Myriad attributes this sustained growth to a loyal client base that has seen tangible, powerful business results from partnering with Myriad. As clients’ needs evolve in a rapidly-changing tech landscape, Myriad has tailored its offerings within the areas of SDN, mobility, security, and cloud. 

The Fast Growth 150 list is highlighted in the August print issue of CRN and can be viewed online at http://www.crn.com/fastgrowth150.
 

About Myriad Supply    

Myriad Supply is a cybersecurity consultancy and global provider of hardware and software solutions from top manufacturers. With a security-first approach, Myriad guides enterprises to define, design, and implement business-critical technology improvements within the areas of security, SDN, mobility, and cloud. To learn more, visit www.MyriadSupply.com or email hello@myriadsupply.com.  

About the Channel Company  

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelco.com  

Myriad Supply Contact:
Kirsten Gonzalez 
Myriad Supply 
(646) 795-6047
kgonzalez@myriadsupply.com 

The Channel Company Contact:
Jennifer Hogan
The Channel Company
(508) 416-1189
jhogan@thechannelco.com  

“Ideal State”: What it Means for Cybersecurity

In our recent webinar from July 19th, Thomas Norman, Global Cybersecurity Technology Consultant at Ingram Micro joins Chris Grundemann, Principal Security Architect at Myriad, in a discussion about the defining the “ideal state,” the best way businesses can protect themselves in the current dynamic and fast-paced threat landscape. With over 35 years of experience as a cybersecurity consultant in international security and anti-terrorism, Norman begins the presentation with a deep dive into the latest in cybersecurity and the power of AI-powered cyberattacks.

According to CSO Magazine, in addition to being projected as the worst year for data breaches (in number and impact), 2018 has been deemed the year of cyberattacks carried out by artificial intelligence—a method making prevention of breaches even more difficult. Norman explains the exact methods of execution utilized by cybercriminals in the Dyn attack of October 2016, including IoT video security cameras and other headless worm devices. An attack unlike anything industry experts had seen before, Norman describes Dyn’s impact and what we can learn from this new form of attack.

After this comprehensive overview, Norman describes the challenges associated with constantly trying to stay ahead of the latest advancements in cybercrime and how it affects the way businesses are forced to constantly plan new defense strategies. After all, the hurdle many businesses face today is applying the findings from the landscape to their cybersecurity strategy. Norman lists the 4 attack surfaces of InfoSec, as well as what assets need to be protected for a cybersecurity strategy to be considered successful. He asks viewers to consider what a strategy that protects the critical assets of the organization, improves operational efficiency, and reduces cost and risk—in other words, the “ideal state”—would look like for them.

Chris Grundemann leads a Q&A session with Norman surrounding what kind of companies and what sized companies are most at risk for attack, how solutions can be customized based on size or type of organization, the frameworks organizations should consider while modeling their own security posture, the emerging trends in deperimeterization, and the unique benefits of choosing a risk-based strategy or a goal-based strategy.

With risks and threats rapidly changing in real-time, Grundemann and Norman explain the importance of defining your business’s ideal state of security infrastructure, understanding how your current posture stands against the current threats out there, and how to start making steps towards bridging the gap between the two. To view the webinar in its entirety, visit: https://go.myriadsupply.com/IdealStateWebinar_Recording

NANOG 72 Talk: “The API is the New CLI”

When discussing new trends in networking, you’ve probably heard the claim API is the new CLI.

At NANOG 72, Chris Grundemann, Principal Security Architect at Myriad, investigates this claim by first explaining the importance of understanding the differences between the two interfaces. Command Line Interface (CLI) is set up specifically for people to interact with machines, while Application Programming Interface (API) is set up specifically for programs to talk to programs.

When discussing APIs specifically when it comes to networking, there are three to pay attention to: NETCONF (Network Configuration Protocol), REST (Representational State Transfer), and RESTCONF (a combination of the two). For each, Chris breaks down its definition, when it was defined, how it works, what it interacts with, what software is used to support it, the flow of data through the API and how it is encoded, its unique features, and how the API can be used in conjunction with other features on a network.

Chris also describes YANG, which is not an API, but rather the data model for formatting data. One can then use NETCONF or RESTCONF to encode the data and send to (or receive from) network devices.

APIs are powerful tools used to allow programs to communicate reliably with network devices, whether it be scripts talking to devices you could write yourself or more complex, intent-based systems where you are interacting with a system that’s been interacting with the devices through an API. Chris closes by giving insight into which interface is more appropriate for day-to-day operations and growing networks, in addition to describing what situations would require CLI, API, or both.