
December 11, 2019

Filed Under:
Cyber Security,
security,
disaster recovery,
DaaS,
cloud,
backup
November 26, 2019

Filed Under:
Digital Transformation,
cloud migration,
moving to the cloud
November 5, 2019

Filed Under:
Company News
October 29, 2019

Filed Under:
cloud contact center,
Microsoft,
Cloud,
Cisco,
cloud technologies,
contact center,
cloud
October 24, 2019

Filed Under:
Enterprise Visions,
artificial intelligence,
Company News,
sys
October 15, 2019

Filed Under:
Company News
September 9, 2019
The incident response plan outlined at the bottom of this post is a snippet from a generic plan I found on Google. It is a plan created by Virginia Tech. In its entirety, it is 41 pages long. Try flipping through that when you are under attack! Can you guess how long each step below will take your IT group, without help? One can imagine that the times can vary widely depending […]
Filed Under:
Uncategorized
September 9, 2019
It surprises me how many tools companies use for cyber security are just logging tools. Sure, logging should be one part of your security posture, but it is unwise to rely on logging for the total solution. So, if logging from tools like Splunk, LogRhythm and AlienVault were valuable from a forensic standpoint, why is the logging that is collected so often inadmissible in court[…]
Filed Under:
Uncategorized
August 26, 2019
Layers 5-7 are where applications reside and where attacks on them take place. Interestingly, many vendors’ cybersecurity tools also reside here. Some vendors put the instructions on how to install their agents or virtual appliances on their web site. You will see that they are installed in the Program Files” folder - Layer 7. Virtual Appliances in the cloud reside on an instan[…]
Filed Under:
Uncategorized
August 26, 2019

Filed Under:
environment,
SDN,
software-defined networking,
performance,
complexity,
cloud,
Enterprise
RECENT POSTS
- Top 5 Benefits of Conducting a Gap Analysis in Cyber Security
- 4 Ways Mobile Device Fleet Management Tools Streamline Modern Businesses
- How Outsourced Telecom Expense Management Can Help Your Business Grow
- 7 Benefits of AI in Cyber Security
- How Businesses Use AI To Improve Customer Experience
- 6 Reasons Why Businesses Should Consider the Cloud for Cyber Security
ARCHIVES
CATEGORIES