Who’s passed more than a weekend going almost blind because something in your didn’t work as it should, and it produced, hopefully, thousands of lines of error messages, almost all…
The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from…
Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to…
Malware prevention is a very hot topic due to the recent ransomware attacks that have completely crippled several companies and organizations. For most smaller companies, being able to hire a…
Hybrid IT presents SecOps challenges The Department of Defense (DoD) has long been at the tip of the spear when it comes to successfully melding IT security and operations…
“The price of reliability is the pursuit of the utmost simplicity.” C.A.R. Hoare, Turing Award lecture. Software and computers in general are inherently dynamic and not of a state…
How to use network configuration, change, and compliance management (NCCCM) and other monitoring software in response to an actual security breach. If you have not read part one, I would suggest that…
Why network configuration, change, and compliance management (NCCCM) is a must Inspired by former Citibank employee sentencing We’ve all heard horror stories about the disgruntled employee who pillages the office supply…
Here’s an interesting article from my colleague Joe Kim, in which he offers suggestions to reduce cybersecurity vulnerabilities. Agencies should focus on the basics to protect against attacks The government’s…
Risk Management is an important part of IT. Being able to identify risks and remediation options can make a huge difference if or when disaster strikes. If you’ve moved part…