Blog
By Rob Young
Cloud computing is evolving at a rapid pace. Today, there’s a range of choices for moving applications and data to cloud that includes various deployment models from public and private to hybrid cloud service types. Organizations are seeking ways to utilize multiple clouds as part of a broader digital strategy. With
By James Kobielus
Disinformation, malware, and an array of cyber attacks are rising as fast as case counts. Cyber security inevitably suffers when scares infect the populace. The Covid-19 outbreak appears to be the most acute global crisis since the Second World War. Every aspect of the Covid-19 crisis has been exploited by
By Jeremy Kirk
Study Suggests Actionable Recommendations Would Improve IoT Security. The concern over the security risks posed by connected devices has prompted widespread efforts by standards bodies, governments and industry groups to create guidelines for best practices. The result has been the creation of far more guidelines and documents than anyone could reasonably
By Christopher Tozzi
Advancements in IT cyber security lag all other areas of tech, which puts applications and data at unnecessary risk. By most measures, information technology has advanced by leaps and bounds during the past several decades. CPUs are orders of magnitudes faster, less expensive and more focused than they were around
By Perry Cohen
From their inception, PCs, industrial systems, and all manner of computing devices were designed as individual points of compute. As a result, security was never top of mind. However, today everything is connected. The IoT and Industry 4.0 have introduced new security threats that were not originally considered. Therefore, the