gestaltit

Tag: gestaltit

Policy and Controls – A Foundation for Threat Protection

In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…

Culture of Data Protection: Data Quality, Privacy, and Security

As I explained in previous posts on building a culture of data protection, we in the technology world must embrace data protection by design. To Reward, We Must Measure. How…

What Is Root Cause Analysis?

If you work in engineering or support, you’ve probably spent a lot of time troubleshooting things. You’ve probably spent just as much time trying to figure out why things were…

The Human Side of IT

The technology industry is about technology. Technology is the fastest changing industry there is, but the often-overlooked part of this industry is the humans that work with the technology. Humans…

How Well Do You Know Your IT Environment?

Do you know what’s in your data center? How about your wide area network (WAN)? If you had to draw a map or produce a list of all the things…

Related Attributes: NetFlow and Interface Traffic Statistics

For many engineers, operators, and information security professionals, traffic flow information is a key element to performing both daily and long-term strategic tasks. This data usually takes the form of NetFlow version…

Defining Your IT Journey

The IT journey is really nothing more than your career plan or goals that you have for your career. It’s the story of you. I call it the IT Journey because it’s…

Cybersecurity Fundamentals – Attack Surfaces and Vulnerabilities

In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…

Culture of Data Protection: Development Counts, Too.

In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challenging. In fact, most…

Monitoring Your Systems in the Cloud

What happens to our applications and infrastructure when we place them in the cloud?  Have you ever felt like you’ve lost insight into your infrastructure after migrating it to the…