BehavioSec Fires Up Next-Gen Cybersecurity Solutions with Behavioral Biometrics

There’s no silver bullet for online security, especially when it comes to user authentication. And enterprises aren’t alone in the struggle to keep up with the needs and demands of authentication. […]
Read More

Do you Trust that (Data) Model?

As George Box noted several decades ago, “All Models are essentially wrong, but some are useful”.  The work of statistical analysis, and its modern day derivatives of Machine Learning and Deep […]
Read More

Building Network Architectures of the Future

Just as networking technology is evolving, so too are the architectures that connect and support applications and services. In today’s IT world, there is no enterprise-wide infrastructure. Rather, […]
Read More

Layers of Security

Do you remember the movie “Die Hard”?  Arguably the best Christmas movie ever. All kidding aside, this movie has a great correlation into Security best practices.  Before we go into that, let’s […]
Read More

Fortifying Foundations – The Secret to Amplifying AI in the Digital Age

As any architect worth his brick and mortar will tell you, a solid foundation is the key to achieving the desired outcome of any substantial structure. This is certainly true when it comes to […]
Read More

Tackling the Growing Threat Landscape of ICS and the IIoT

It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise. The question is no longer whether […]
Read More

Beware of these 4 types of hackers

Hackers come in all shapes and sizes. From kids wanting to gain notoriety on the internet to political groups trying to send a message, the motives for a cyberattack vary widely. So how can you […]
Read More

Comparing VoIP Benefits With Those of SIP

If you’re comparing options for upgrading your communications system, it’s likely you’ve encountered Voice over Internet Protocol (VoIP). VoIP benefits begin with the simple fact that calls are […]
Read More

Mainframes Without Experts?

The short blog on the long goodbye
Read More

Manage Cloud Performance Like a Fine Tuned Automobile

I used to have a Saab that was the bane of my existence. Each morning, I would walk out to my car, put my key in the ignition and hope it would start. Every once it a while, it would, and on those […]
Read More

Disruption on High: Managing Cyber Risk in a Multicloud World

Digital transformation is happening and with it comes the pain of disruption. For many organizations around the world, it looks like this: your workforce is increasingly mobile, employees are […]
Read More

5 Simple but effective cybersecurity tricks

Can you name five cybersecurity best practices? Most people can’t, and few of those who can, actually follow them. Unfortunately, cyberattacks are far too common to be lax about staying safe online. […]
Read More

Machine Learning is NOT Rocket Science

Movies have always created powerful mystique about artificial intelligence. For example,  2001: A Space Odyssey had the computer, Hal 9000, that recognized astronauts, spoke to them, and even […]
Read More

Building the 5G Business Case

2018 to date has been the year when 5G came out of the standards and into reality, with many trials throughout Asia Pacific (APAC). The learnings from these trials have shown us not only what […]
Read More

U.S.-Mexico-Canada Agreement Enables the Digital Economy

Minutes before a midnight deadline on October 1, the U.S., Mexico and Canada agreed on a new trade pact to replace the previous North American Free Trade Agreement (NAFTA). The new trade agreement […]
Read More

Phishing 101: Protection for Everyone

Every October, we celebrate National Cybersecurity Awareness Month (NCSAM). This NCSAM, the five weeks of October are focused on five separate cybersecurity themes: simple steps to online safety, […]
Read More

Cyber Attacks and Small Businesses: Your Strategy to a Safer Environment

Just because you’re a small business doesn’t mean cyber criminals will ignore you. Cyber attacks and small businesses are a mixture that is increasingly becoming more common. The culprit, for many […]
Read More

Web trends in the instant gratification age

Modern internet users usually don’t spend much time on one page. According to researchers, adult attention spans have dropped to eight seconds, creating serious challenges for business owners who […]
Read More

Forget these disaster recovery myths

Disaster recovery (DR) isn’t what it used to be. Long gone are the days when a DR solution cost over a hundred thousand dollars and relied predominantly on tape backups. Cloud computing has […]
Read More

Modernization Is More Than “Happy Little Trees”: Moving Beyond the Storage/Server Mindset

Have you ever seen Joy of Painting? If not, look it up and watch an episode or two. Bob Ross was a great painter and a calming force, which is impressive given his history as a U.S. Air Force […]
Read More

Secondhand IoT Devices, Firsthand Threats to Security

From thermostats and voice assistants to fitness trackers and toys, smart and internet-connected gadgets are now found in nearly every room of most homes. It’s tempting to try and save money on […]
Read More

4 Social engineering scams to watch out for

Experts are constantly creating new security systems to protect individuals and businesses from hackers. From those who want to attend popular events like the Olympics to avoiding an angry boss, […]
Read More

CFOs Need Mavericks to Boost Data Analytics

We are moving from an era of data scarcity to an era of data abundance. This is being driven by the digital age we live in. But data is not made equal, some of it is far less useful or trustworthy […]
Read More
1