Resources
Information, Innovation, Insight, and Client Success Stories!

2 min read

Three Cyber Threat Hunting Myths

In my last cyber threat hunting blog, I defined cyber threat hunting and outlined when and why you should use it. Just to reiterate, cyber threat hunting is the process of proactively and iteratively searching through your network to detect and...

Read More

2 min read

The most pressing data concern in 2019

Around this time every year, I always see an influx of the top trends in technology. It seems like the perennial hot topic is security, with good...

Read More

2 min read

Are EHRs useful?

The healthcare industry is embracing the use of electronic health records (EHRs). It advances a new type of data management system that aims to...

Read More

3 min read

Why hybrid IT is the best of both worlds

When Henry Ford famously declared, “You can have any color you want as long as it’s black,” the world wasn’t used to the endless personalization...

Read More

2 min read

Going nowhere fast?

Studies show that even under perfect driving conditions, speeding over short distances leads to marginal savings in getting to your destination. Add...

Read More

2 min read

Five common misconceptions about DDoS

In my first blog on distributed denial-of-service (DDoS) detection, “DDoS: It’s Not a Matter of If, But When,” I provide a brief understanding why...

Read More

4 min read

Just Go Away! 4 Server Technologies to Ditch in 2019

It’s that time of year again. Another year gone by, which means prepare to be bombarded with bold predictions of technology-related innovations and...

Read More

4 min read

Why Business Leaders Should Care About Quantum Computing

In the tech sector, pundits are always hyping the next, disruptive technology on the verge of changing, well, everything. “Embrace this...

Read More

3 min read

Top 10 Smart City Trends for 2019

The way we think about Smart Cities will undergo a major re-think in 2019. As smartphones reach peak saturation and the Internet of Things (IoT)...

Read More

2 min read

Phishing through VoIP: How scammers do it

Many businesses nowadays are well-armed against email-based phishing scams, which is why scammers have moved over to VoIP (Voice over Internet...

Read More