May 24, 2023
7 Tips for Building a Recession-Friendly Cloud Technology Strategy Today's business leaders are tasked with navigating financial challenges while staying competitive in an unpredictable economy. A recent survey by the World Economic Forum found that 63% of chief economists expect a global recession to occur this year,1 while others believe all signs point to stability. Despite growing uncertainty, market analysts project worldwide IT spending […]
September 9, 2019
The incident response plan outlined at the bottom of this post is a snippet from a generic plan I found on Google. It is a plan created by Virginia Tech. In its entirety, it is 41 pages long. Try flipping through that when you are under attack! Can you guess how long each step below will take your IT group, without help? One can imagine that the times can vary widely depending […]
Filed Under: Uncategorized
September 9, 2019
It surprises me how many tools companies use for cyber security are just logging tools. Sure, logging should be one part of your security posture, but it is unwise to rely on logging for the total solution. So, if logging from tools like Splunk, LogRhythm and AlienVault were valuable from a forensic standpoint, why is the logging that is collected so often inadmissible in court[…]
Filed Under: Uncategorized
August 26, 2019
Layers 5-7 are where applications reside and where attacks on them take place. Interestingly, many vendors’ cybersecurity tools also reside here. Some vendors put the instructions on how to install their agents or virtual appliances on their web site. You will see that they are installed in the Program Files” folder - Layer 7. Virtual Appliances in the cloud reside on an instan[…]
Filed Under: Uncategorized
July 25, 2019
Vendors today all take a pride in notifying customers of breaches, helping track the spread of the breach, and offering advice on how to remediate the breach. That sounds nice but, it is not so nice. Especially for someone who doesn’t know security well, the instructions can be confusing. Adrenaline + Stress = Instructions that look like they are written in a language from anot[…]
Filed Under: Uncategorized
December 17, 2018
Cyber Security Findings: Improving Your Security Plan Pays Off Wipro’s State of Cyber Security Report 2018 presents some startling facts that should be carefully considered by organizations large and small. Cyber security findings point to the healthcare industry being heavily targeted. Also, Personally Identifiable Information (PII) and user credentials are at the top of the list for how hackers make their breaches. Wipro’s report shows t[…]
November 15, 2013
Copyright (c) 123RF Stock Photos Polls taken in December 2012 for the Gartner data center conference showed an interesting confluence with a similar poll taken for the December 2009 conference. The data for hybrid cloud adoption collected in 2012 lined up very closely to the data collected for private cloud adoption in 2009. This could indicate that hybrid cloud technology is o[…]
Filed Under: Uncategorized
November 4, 2013
Copyright (c) 123RF Stock Photos While Data Center Infrastructure Management (DCIM) systems might seem like an obsolete reworking of older technologies, it's not. First, while the cloud is changing the nature of the data center, it isn't eliminating the need for data center management systems. In companies that still have private or hybrid clouds, data centers are still crucial[…]
Filed Under: Uncategorized
1
RECENT POSTS
ARCHIVES

CATEGORIES