Things move fast in cybersecurity, and it’s always worth investing time to stay up-to-date on the state of the field. I’ve gathered 15 articles all about cybersecurity news and insights to provide some food for thought. … [Read more...] about Q1 Roundup: 15 Interesting Articles on Cybersecurity News & Expert Opinions
Although it ought to be a basic task, patch management has nearly gotten out of control. Many vendors, to their credit, are quick to release patches when they discover issues. But there are more devices and applications on today’s networks, and an ever-growing … [Read more...] about The IT Pro’s Guide to Super Effective Patch Management
It’s an exciting time in medicine. Technology is constantly making healthcare more accessible, more precise, and more convenient. For instance, IoT in healthcare can increase hospitals’ efficiency in many ways. But you should also be prepared for the risks it … [Read more...] about IoT in Healthcare: Managing The Opportunity & The Risk
As we've inched closer and closer to quantum computing, quantum cryptography has become a greater concern. We haven't yet created a quantum computer that's faster than the binary computers we use today, but it's possible that this will change within a few … [Read more...] about Quantum Cryptography Explained: Applications, Disadvantages, & How It Works
In computer science, the concept of network layers is a framework that helps to understand complex network interactions. There are two models that are widely referenced today: OSI and TCP/IP. The concepts are similar, but the layers themselves differ between … [Read more...] about The Network Layers Explained [with examples]
Simply put, network analytics is the practice of using different types of network data to identify trends and patterns. Then, that information is used to make better decisions—troubleshooting decisions, threat remediation decisions, business planning … [Read more...] about Network Analytics: What It Is, How It’s Used, and Who Benefits the Most
In my experience, most conversations on how to protect customer data revolve around active companies. Certainly important, but what about bankrupt companies? That data doesn’t simply disappear when the organization declares bankruptcy. And in many cases, the … [Read more...] about On Protecting Customer Data: What Happens After Bankruptcy?
IT budgets require a lot of thought, but the process of planning, organizing, and presenting your budget doesn’t have to be painful. In fact, a well-developed IT budget can be a focused road map for your IT strategy. You'll avoid “wish list” budgets that … [Read more...] about How to Build a Strategic IT Budget and Get the C-Suite to Recognize Your Value
Data silos, while common, are huge sources of inefficiency in any department or organization. This problem is exacerbated in IT, where any loss of time can incur huge costs. This blog will discuss, from the perspective of NetOps and SecOps, what data silos … [Read more...] about What is a Data Silo and Why is It Bad for Your Organization?
One of last year’s biggest threats is rearing its ugly head again in the form of a WannaCry phishing email scam. Early on June 21st, many people in the UK received an email informing them that the sender had infected their system with WannaCry. The senders … [Read more...] about This WannaCry Phishing Email is an Empty Threat