The need for reprioritizing digital transformation projects during a crisis has come. COVID-19 has created a fast-paced environment for tech pros in which once-necessary tasks are now pushed to the…
Inevitably, at some point in the evolution of your security strategy, you realize you need to put some controls around access. For far too long, organizations have allowed users to…
The federal government’s 2019 Federal Cloud Computing Strategy — Cloud Smart calls for improvements in security, procurement and the workforce. Let’s look at each of the three Cloud Smart pillars…
The day has finally come. We’ve potentially ventured out of our comfort zone to collect information on business strategy and requirements from the leaders in our company. We then put…
Commercial off-the-shelf (COTS) applications, Software-as-a-Service (SaaS) hosted applications, and custom apps: Historically, application performance management (APM) covered only one or two of those three things. The traditional APM only applied…
Confirmed cases of COVID-19 (or coronavirus) continue to rise globally, and health departments have done much to attempt to control the outbreak. To prevent transmission of the virus, there are…
You probably aren’t surprised to know as I write this, I’m wearing pajamas. You probably are, too. These days, nobody’s going to judge our choices when we’re just trying to…
Most of us have no idea if our credentials are out in the wild, for bad actors to take and use for malicious intent. Unfortunately, they often are. Since October…
Federal IT pros are having more success tackling cybersecurity challenges within their agencies. However, there’s still much work to be done when it comes to solving the security challenges posed…
Global pandemic is a helluva way to learn work from home. After 20+ years of working in an office, it’s been a far bigger change than I’d imagined. Especially if…