Natalie

2 min read

Three Cyber Threat Hunting Myths

In my last cyber threat hunting blog, I defined cyber threat hunting and outlined when and why you should use it. Just to reiterate, cyber threat hunting is the process of proactively and iteratively searching through your network to detect and...

Read More

2 min read

The most pressing data concern in 2019

Around this time every year, I always see an influx of the top trends in technology. It seems like the perennial hot topic is security, with good...

Read More

3 min read

Why hybrid IT is the best of both worlds

When Henry Ford famously declared, “You can have any color you want as long as it’s black,” the world wasn’t used to the endless personalization...

Read More

2 min read

Going nowhere fast?

Studies show that even under perfect driving conditions, speeding over short distances leads to marginal savings in getting to your destination. Add...

Read More

2 min read

Five common misconceptions about DDoS

In my first blog on distributed denial-of-service (DDoS) detection, “DDoS: It’s Not a Matter of If, But When,” I provide a brief understanding why...

Read More

4 min read

Just Go Away! 4 Server Technologies to Ditch in 2019

It’s that time of year again. Another year gone by, which means prepare to be bombarded with bold predictions of technology-related innovations and...

Read More

4 min read

Why Business Leaders Should Care About Quantum Computing

In the tech sector, pundits are always hyping the next, disruptive technology on the verge of changing, well, everything. “Embrace this...

Read More

3 min read

Top 10 Smart City Trends for 2019

The way we think about Smart Cities will undergo a major re-think in 2019. As smartphones reach peak saturation and the Internet of Things (IoT)...

Read More

3 min read

How real is AI?

Every few years a new-hype technology becomes the shining star. It sucks all the oxygen out of the room and becomes the headline darling for a while....

Read More

3 min read

DDoS: It’s not a matter of if, but when

A distributed-denial-of-service or DDoS attack is a cyber-attack that renders a machine or network resource that is connected to the Internet...

Read More