Finding Peace in Cloud Migrations
by Paul Ward “You’ll be on cloud nine!” In the hills of eastern Kentucky, literary idioms are a huge part of the language. Examples like “You’re barking up the wrong tree”, “eating high on the…
by Paul Ward “You’ll be on cloud nine!” In the hills of eastern Kentucky, literary idioms are a huge part of the language. Examples like “You’re barking up the wrong tree”, “eating high on the…
by Mick Bisignani Introduction As a business executive, have you ever wondered about the impact of Technical Debt on your business? Over the years, I have had the good fortune to actively work as an IT…
by John Flores Over the past year, rapid changes in the technology landscape have made software modernization an imperative for organizations of all sizes. As organizations accelerated the movement of legacy applications to the cloud to…
by Niko Zivanovich For years, security practitioners have had the unenvious responsibility of architecting creative solutions to protect our end users. While there is nothing new to this, the issue is – and always will be – the moving target of what the…
Balancing cloud security without compromising user experience is a problem IT professionals face every day. With Citrix Secure Internet Access (CSIA), you don’t have to give up one to get the other! In this 30-minute…
Blog by Robert Tang, courtesy of Cisco. These are times of unprecedented change for organizations. Employees are working anywhere, whether that be remotely at home, on the go, at the branch or campus offices. The…
Eighty-one percent of CISOs agree that orchestration between products is challenging. Still, more and more teams are overwhelmed with disconnected vendors and products. You can’t detect security threats quickly if your products don’t work together.…
Basic hygiene best practices go beyond hand washing – even if you’re doing lots of that these days. The same hygiene concept extends into the digital world of cybersecurity. In an age of near-constant attacks,…
Advanced, targeted phishing scams that impersonate well-known brands or VIPs within an organization are a big problem for security teams to deal with. One common feature of these impersonation attacks, also known as Business Email…
Blog by Sr. Risk and Compliance Consultant Tim Paschal and Principal Risk and Compliance Consultant Anton Abaya. One of our Risk and Compliance team members likes to tell a story of when he was young…