At the end of last year, I went to a Cyber Security event and the keynote speaker Charlie Miller, renowned hacker, talked about vulnerabilities in code. In his opinion, because we are human, we make mistakes and when we make mistakes in writing code (very common) vulnerabilities are created. It is stated that 96% of Web applications have code vulnerabilities (Cenzic). Charlie found one tiny vulnerability in his Jeep which allowed him to hack the vehicle and take control of the steering wheel.
Over the years, technology has allowed us to better collaborate with things such as on-prem phones, smart phones, email, Webex, Skype, and so much more. We use these these products every day and they help us to be more productive in a virtual world where employees and customers are dispersed hundreds to thousands of miles apart.
Your employees use a ton of applications whether they are web based, cloud based, or on premise. Making sure your users have access to these applications is integral to business productivity. On the other side of things, making sure you have visibility and policy on which applications can be accessed is extremely important to compliance and the overall security posture of your organization.
I have started to hear SD WAN popping up in conversations and in my news feed so I figured it was time to write a blog on it.
There is no one simple answer here. At some point, maybe in 5 years, the time to invest will be “NOW!” But when we talk about investment into 802.11ac, we like to take a slow and progressive approach.
The news is out. 802.11ac is worlds faster than 802.11n. Or is it?
I think we all understand the benefits of moving to the cloud and we all want to do it but there is a major question of “how?” Do you have budget, resources, or expertise?
The leader in private cloud datacenter services and the leader in public cloud services partner to bring the best of both worlds and a hybrid IT solution to your datacenter. Is it a match made in heaven?
I recently attended an event at San Diego State University known as Link2Cyber.