By Richard Arneson To detail in a book the benefits that the digital age has delivered over the past twenty (20) would make Moby Dick look like a brochure. In a much, much smaller book would be a list of any negative ramifications, most of which would fall under the
By Richard Arneson Apologies for the headline in the event you’ll soon label it as an act of sensationalism, but the topic of today’s blog needs to be considered, then forwarded, if you or others you know have implemented, or are in the planning stages of implementing, your organization’s IoT
By Richard Arneson Leave it Hollywood to allow the smallest attack surface in history to be breached. In the first Star Wars movie, the Death Star, which appeared to be only slightly smaller than Earth, had a tiny aperture that, if penetrated, would magically destroy the entire, menacing orb. Naturally,
By Richard Arneson Everybody loves the cloud, and why wouldn’t they? The amount of innovation and productivity it has brought to businesses worldwide has been staggering. Where Salesforce once appeared to stand alone as the only cloud-based software service, it’s been joined over the past few years by thousands of
By Richard Arneson You won’t find its definition in Merriam-Webster, The Oxford English Dictionary or at Dictionary.com. But if you’re in the IT industry, it’s a term you’ve either heard or will be hearing a lot about soon. Why? Because Tetration is what Cisco has named its robust analytics platform.
By Richard Arneson Every organization has, has plans to, or wants to move to The Cloud. And by 2020, most will be there. According to a recent survey, within two (2) years 83% of enterprise workloads will be in The Cloud―41% on public Clouds, like AWS and Microsoft Azure, 20%
Choose to ignore it and you’ll pay later (just ask the city of Atlanta) In March of this year, the City of Atlanta found out the hard way what failing to do a security check-up can mean. They were hit with the SamSam ransomware, which created an encrypted wall that
By Richard Arneson An 18-month-old study by the Ponemon Institute, an independent research and education organization that works to advance privacy management practices for businesses and government agencies, discovered that, even though malicious insiders compose the largest, most costly source of security breaches, over seventy-five percent (75%) of businesses largely
It’s not uncommon for people, even some IT professionals, to assume all of their organization’s security needs are being addressed through their NOC (Network Operations Center). Chances are, they’re not. NOCs and SOCs (Security Operations Centers) are entirely different animals, however, with varying goals and staffed by IT professionals with
Copyright © 2019-2024 General Datatech, LP. All rights reserved. GDT names and logos are trademarks, or trademarks Reg. U.S. Pat. & TM Office, of General Datatech, LP and/or its affiliates in the U.S. and other countries. Third-party trademarks mentioned or reflected herein are the property of their respective owners. Additionally, the use of the word “partner” does not imply a legal partnership relationship between GDT and any other company.
Copyright © 2019-2024 General Datatech, LP. All rights reserved. GDT names and logos are trademarks, or trademarks Reg. U.S. Pat. & TM Office, of General Datatech, LP and/or its affiliates in the U.S. and other countries. Third-party trademarks mentioned or reflected herein are the property of their respective owners. Additionally, the use of the word “partner” does not imply a legal partnership relationship between GDT and any other company.