Does private browsing secure your data?

If you’re getting targeted with surprisingly relevant ads, there’s a chance your internet activity is being tracked and analyzed by market researchers. While this doesn’t bother most people, private […]
Read More

The Collateral Damage of DDoS Attacks - Part 1. What is what

ISP networks are part of the backbone of the Internet—and carry any and every security threat. Most threats are not considered by the ISP, since they do not harm their own infrastructure, they are […]
Read More

Seven Deadly Deceptions of Network Automation

The greatest deception men suffer is from their own opinions. - Leonardo da Vinci
Read More

Data Capital: Separating the Winners and Losers of Tomorrow

It’s undeniable; digital transformation is reshaping the world around us. Analyst firm IDC predicts that by 2021, at least 50 percent of global GDP will be digitized, with growth in every industry […]
Read More

Why hypervisor security is important

Virtualization has become essential for businesses looking for better resource provisioning, easier IT management, less hardware, and lower costs. But virtualization is a complex and constantly […]
Read More

Best uses of Alexa in a business setting

Individual users find plenty to like about Amazon’s AI technology Alexa. It’s a great way to control smart home devices and perform small tasks like make shopping lists and answer phone calls. But […]
Read More

Outlook tips to increase productivity

Microsoft is constantly updating and improving its Outlook email program, and some users struggle to keep up with all the new and exciting features. If you want to catch up on the latest […]
Read More

Humanity and Artificial Intelligence – Shape Our Future in Harmony, Rethink Our Societies.

Of all the emerging technologies that are set to impact the way we work and the way we live, Artificial Intelligence (AI) is, without doubt, the most challenging. Coupled with Machine Learning (ML), […]
Read More

Discover the VoIP suitable for you

VoIP, or Voice over Internet Protocol, is a telephony solution that allows users to make calls through any internet-enabled desk phone (hardphone) or software device (softphone). The type of business […]
Read More

Attackers turn to IoT and ICS to find gaps in security

Research from Cisco and partners reveal increased interest in IoT and ICS from security professionals and attackers alike Technology solutions and processes that rely on the Internet of Things […]
Read More

The Fourth Network Revolution

We stand in the midst of a technological revolution. The complexity, scale, and more importantly, the pace, are unlike anything humankind has experienced before. The speed of current technological […]
Read More

Millions more affected by Equifax leaks

Back in 2017, Equifax, one of the three major credit bureaus in the US, made a major security blunder that leaked millions of sensitive information, including Social Security numbers, addresses, […]
Read More

Choosing the right virtualization strategy

Just because virtualization is an incredibly advanced and complicated technology doesn’t mean small businesses can’t get in on the action. As experts debate the merits of virtual desktops versus […]
Read More

Is your Financial Service Firms defensive strategy stuck in the past?

It’s that time of the year again. The annual month where suddenly everyone is a college basketball expert; March Madness. This past weekend, I found myself glued to my television set watching as […]
Read More

Using machine learning to detect possible insider threats

Cloud applications are now commonplace in enterprises. From productivity applications to storage, employees and IT departments are realizing the benefits of offloading documents and data into the […]
Read More

HTTPS is something to care about

For all the time we spend discussing the complexity of internet security, there are a few simple things you can do. Avoiding websites that aren’t secured with the HTTPS protocol is one of them. It’s […]
Read More

Do You Know the Anatomy of a Ransomware Attack?

See how an effective ransomware attack comes together. This is why today's enterprises require effective security. https://www.youtube.com/watch?v=4gR562GW7TI Published with permission […]
Read More

No IP no future?

Content producers, broadcasters, and service providers must have high-speed interconnections for the distribution of programs, playout, over-the-top streaming, and live events. IP promises economies […]
Read More

Five SMB Technology Trends for 2018

Technology drives business. Whereas once IT was a function of business, it now increasingly IS the business.
Read More

Cryptojacking: How to protect yourself

Over time, your computer will work slower as software requirements become more demanding. But if you have a relatively new computer, and are experiencing performance problems after clicking a link or […]
Read More

2018 Cybersecurity Report Spotlights Emerging Threats to OT Environments

Manufacturers saw many interesting developments in the realm of industrial security in 2017. There were tremendous shifts in how to guard against threats with ransomware like WannaCry, Nyetya, and […]
Read More

Automation requires built-in, not bolt-on, monitoring

The industry is ablaze with talk about automation and DevOps. The proliferation of tools across the rest of IT infrastructure has created pressure on networking teams to automate. And with the […]
Read More
1