SolarWinds submitted its self-attestation in alignment with CISA’s and OMB’s requirements on…
What does a wireless thermometer have in common with ping? Both can keep a business from losing cash. One of the ways businesses stay in business is by keeping a…
Effectively setting and managing customers’ expectations is what drives their level of service satisfaction. One terrific way to set and manage expectations is through the use of service-level agreements, or…
I really want Software Defined Networking (SDN), or something like it, to be the go-to approach for networking, but are we too tied to our idea of what SDN is…
I’ve heard repeatedly from people in this industry that what we need is a single interface to our infrastructure. For status monitoring, perhaps that’s best represented by the ubiquitous “Single…
Establishing and refining CSI goals, metrics, and overall strategy ensuring that they are rooted in both your organizational mission and your long-term IT vision is so important.
Today, in the fifth post of this six-part series, we’re going to cover the fourth and final domain of our reference model for IT infrastructure security. Not only is this…
“Too many secrets.” – Martin Bishop One of the pivotal moments in the movie Sneakers is when Martin Bishop realizes that they have a device that can break any encryption…
The Dream of the Data Center For me, it started with OpenStack. I was at a conference a number of years ago listening to Shannon McFarland talking about using OpenStack…
Pre-planning and practicing internal communication in anticipation of the next incident is so crucial to improving your overall organizational response to incidents.
One of my biggest pet peeves with AI is the word itself. Words matter, especially in IT. Whether you’re trying to nail down a scope of work for a project,…