You Are Here – Identity & Access Security
November 8, 2018
Security
Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape…
Where Is Your Configuration Source of Truth?
Ask a good server engineer where their server configuration is defined and the answer will likely be something similar to In my Puppet manifests. Ask a network administrator the same thing about…
My Affection for AI
In my last post, I mentioned one of the basic use cases for Artificial Intelligence (AI) in a modern network. AI can be utilized to not only bridge the informational…
Am I Automating Myself Out of a Job?
Is our contribution measured by what we’re doing or how we’re doing it? Are we providing value or are we just getting caught up in what’s exciting? How do we…