By

Pylon Editorial Team
Data Science without a sense of business is like playing baseball without as baseball. For every business, making its products or services better is the ultimate goal of a data science project. Leaving that out of the picture is nonsensical. Your data team could feature the best coders and the best statisticians, but if they...
Read More
Overview Since its release in February 2014, the NIST Framework for Securing Critical Infrastructure Cybersecurity has become a major part of the national conversation about cybersecurity for critical infrastructure (and beyond). We believe it represents an important step towards large-scale andspecific improvements in security for the United States and internationally. The Center for Internet Security...
Read More
The CIS Critical Security Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive and dangerous attacks. They are developed, refined, validated, and supported by a large volunteer community of security experts under the stewardship of the Center for Internet Security (www.cisecurity.org). Contributors, adopters,...
Read More
Microsoft 365 E-Mail Setup
You can configure Microsoft Outlook to access your Office 365 account by setting up an Exchange connection. An Exchange connection provides access your email, calendar, contacts, and tasks in Outlook. You will first need to make sure that you have a current version of Outlook designed to work with Microsoft 365. Please open a ticket...
Read More
Cyber Response
Incident response (IR) is a structured methodology for handling security incidents, breaches, and cyber threats. A well-defined incident response plan allows you to effectively identify, minimize the damage, and reduce the cost of a cyber attack, while finding and fixing the cause to prevent future attacks.
Read More
Cyber Response
Incident response (IR) is a structured methodology for handling security incidents, breaches, and cyber threats. A well-defined incident response plan allows you to effectively identify, minimize the damage, and reduce the cost of a cyber attack, while finding and fixing the cause to prevent future attacks.
Read More
How to Redact a PDF File
Most e-discovery review software has the ability to redact documents and then produce a new file with all of the important information redacted. The benefit of this is that you'll still have a lineage of the document whereby you have access to the original, unedited, document and everyone else will have the redacted, secure file.
Read More

Contact Us!

Pylon Technology

Voice: 203-930-3410

E-Mail (inquiries): [email protected]

E-Mail (support): [email protected]

Pylon Technology