Blog

Infosec professionals are well familiar with the phenomenon of Transport Layer Security (TLS) interception. For everyone else, some background: TLS is the successor to SSL, once the default encryption protocol. TSL provides the underpinnings for many common security protocols, including secure HTTP (HTTPS). Protocols like TLS...

Moving more work into the cloud makes IT revisit the question: Leverage vendor-specific platform services or give up leverage for control and portability. Haven't We Been Here Before We are just about to launch our latest round of benchmarking the enterprise's use of emerging technology in cloud and data...

Everybody Automates Whether it's Perl or Python or PowerShell,  bash or Ruby or Salt, scripts and recipes are everywhere. And, they are layered: scripts run other scripts, sometimes many layers deep (and sometimes recursively!), or runbook automation tools from the likes of IBM or BMC run...

People have been claiming to have a private cloud for six or seven years, even though (as we discussed recently here) they didn't and don't, really. Why don't they have a private cloud yet? Private Cloud is Hard To be their own Amazon Web Services (or Microsoft Azure, or...

[vc_row][vc_column][vc_column_text]Does security awareness training really matter, or is it a frill? Consider this: Last week, DefensePoint Security, a Virginia-based government cybersecurity contractor, announced its employees’ W-2 tax data had been compromised. But the company wasn’t hacked. It turns out that someone inside the company fell...

Earlier this week I discussed the three top mistakes that companies make when assessing cybersecurity insurance. Now it’s time to take a look at what to consider when assessing insurance coverage. As noted previously, the best way to conduct this review is for the CISO and...

Are You Spending Too Much for UC? Do you have the most efficient architecture, whether on-prem, cloud, or hybrid? Did you select the provider delivering the biggest bang for the buck? We have examined IP telephony, UC suites (IM, presence, desktop video conferencing, audio/Web conferencing),...

Though still in early days, the nexus of artificial intelligence and unified communications is emerging, as AI tools could help streamline collaboration processes. Read more at SearchUnifiedCommunications.TechTarget.com...