Blog

As pretty much everyone on the planet knows by now, last week when footage of a passenger being forcibly removed from his seat by security at the request of United Airlines went viral, United's stock price imploded, slashing the company's market capitalization by $800 million....

Let’s talk headsets. Yes, headsets. With all the activity surrounding many emerging technologies, ranging from machine learning to collaboration to advanced networking, why headsets? They’re becoming increasingly more important to the daily life of employees, how they serve customers, and how they interact with others, either from...

We've been tracking the shift to cloud for a long time now, both the precipitous and the halting. Precipitous, as with SaaS, which went from an oddball kind of solution few companies used 10 years ago to a ubiquitous solution in use at more than 95%...

Nemertes's latest UCC TCO study reveal agility and the ability to refocus IT on strategic initiatives beat cost savings as cloud drivers. When it comes to cloud, you'd think you're either a fool or living under a rock if you're not embracing it. So whenever a...

Many companies are moving towards a DevOps model for developing and deploying software and infrastructure. DevOps is also a bellwether technology for organizations: Companies that have the most mature cloud and data center strategies are three times as likely to use DevOps as are companies...

The past few weeks have seen a spate of infrastructure-related cybersecurity vulnerabilities. On March 8th,  Apache released a critical vulnerability alert (CVE) regarding a significant vulnerability in its Struts 2.0 opensource enterprise Java framework, which is widely used in enterprise deployments.  The vulnerability permits remote code execution (RCE) in the framework; recommended mitigation strategies include upgrading the framework or changing implementations.

Infosec professionals are well familiar with the phenomenon of Transport Layer Security (TLS) interception. For everyone else, some background: TLS is the successor to SSL, once the default encryption protocol. TSL provides the underpinnings for many common security protocols, including secure HTTP (HTTPS). Protocols like TLS...