Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

The Importance of Microsegmentation in a Multilayered Cybersecurity Defense Model

Cybercrime is expected to exceed $10.5 trillion in 2025. To put that into perspective, the total U.S. GDP in 2023 was $21 trillion. So why is cybercrime so profitable? The answer lies in the ‘perfect storm’ of conditions we currently face. Today’s organizations are totally reliant on their digital assets to function. This dependence gives bad actors the opportunity to extract data, digital assets, and money once they are inside a network—often without human intervention.

I Have SD-WAN, Do I Just Need SSE Security for the Branch?

As businesses increasingly adopt Software-Defined Wide Area Network (SD-WAN) solutions to enhance connectivity and performance across their branch offices, a common question arises: “Do I just need Security Service Edge (SSE) security for the branch?” The answer is a resounding “no”. While SSE provides essential security features, it is not sufficient on its own.

AI at the Peak of Inflated Expectations? A Reality Check

The AI hype is undeniable. Buzzwords like ‘machine learning’, ‘deep learning’, and ‘artificial intelligence’ have permeated boardrooms, media, and tech conferences. However, recent market movements suggest that AI might be at the ‘peak of inflated expectations’. Nvidia, a leading player in AI hardware, has seen its stock plummet by about 20% over the last month (8th July to 8th August 2024).

SD-WAN: Dead or Different?

The rapid evolution of work models and security requirements has prompted questions about the relevance of Software-Defined Wide Area Network (SD-WAN) technology. In their insightful report, ‘Is SD-WAN Dead?’ Jonathan Forest and Andrew Lerner of Gartner explore these dynamics, concluding that while SD-WAN is far from obsolete, its role is shifting.

Moving Past Annual Audits: Why Continuous Cybersecurity is Essential

It’s 2 am on a Saturday, you’re sound asleep, and suddenly your phone lights up, ringing and buzzing loudly on your nightstand. You know it won’t be good news, but it’s worse than you could have imagined—your network and systems have suffered a ransomware attack. As you quickly change and start driving into the office, you keep asking yourself one question—didn’t we pass our annual security audit three months ago with flying colors?

Back to the Basics: The Foundational Role of DDI in Any Network

In the ever-evolving landscape of networking, there are a plethora of three-letter acronyms that make up the wonderful alphabet soup that is a part of every engineer’s vocabulary. Whether it’s TCP, UDP, SSH, or one of the many other dozens, one acronym is commonly left out of the discussion: DDI. These seemingly simple letters are often overlooked or rarely thought of, but they are a crucial foundation for managing a stable, secure, and efficient network.

Is Artificial Intelligence for Infrastructure and Operations really just Intelligent Automation?

Artificial Intelligence (AI) tools have the potential to revolutionize IT infrastructure and operations (ITOps) by automating routine tasks, enhancing system reliability, and improving efficiency. However, the term “Artificial Intelligence” can sometimes be misleading in this context. A more accurate description might be “Automated Intelligence” because these tools often automate predefined tasks and processes rather than exhibit true cognitive intelligence.

Harnessing AI for Cybersecurity: Beating AI Attackers at Their Own Game

In the rapidly evolving landscape of cybersecurity, AI-powered attackers are becoming increasingly sophisticated. To counter these threats, organizations must adopt advanced security technologies that leverage AI technology as part of a multi-layered approach to security.

The Crucial Role of Microsegmentation in 2024: Enhancing Cybersecurity in a Hybrid World

In the ever-evolving landscape of cybersecurity, the year 2024 presents unprecedented challenges and opportunities. As organizations continue to embrace digital transformation, the need for robust security measures has never been more critical. New and emerging threats posed by Generative AI, Unsecured API integrations, agile cloud environments, and easy access to sophisticated nefarious code creation are driving the increase in the frequency, volume, and success rate for cybercriminals.

Turkeys, Tech, and Table Settings: A Humorous Guide to IT Security at Thanksgiving Dinner

Let’s set the table a bit. As you know, in the U.S., Thanksgiving is coming up. And recently I had a conversation with my 83-year-old mother about Thanksgiving. Of course, we came across the inevitable parallels between Thanksgiving dinner and network security! That’s what you would be thinking when talking about Thanksgiving dinner with someone right? Before we dive into the feast, let me set the table.