In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…
As I explained in previous posts on building a culture of data protection, we in the technology world must embrace data protection by design. To Reward, We Must Measure. How…
If you work in engineering or support, you’ve probably spent a lot of time troubleshooting things. You’ve probably spent just as much time trying to figure out why things were…
The technology industry is about technology. Technology is the fastest changing industry there is, but the often-overlooked part of this industry is the humans that work with the technology. Humans…
Do you know what’s in your data center? How about your wide area network (WAN)? If you had to draw a map or produce a list of all the things…
For many engineers, operators, and information security professionals, traffic flow information is a key element to performing both daily and long-term strategic tasks. This data usually takes the form of NetFlow version…
The IT journey is really nothing more than your career plan or goals that you have for your career. It’s the story of you. I call it the IT Journey because it’s…
In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…
In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challenging. In fact, most…
What happens to our applications and infrastructure when we place them in the cloud? Have you ever felt like you’ve lost insight into your infrastructure after migrating it to the…