Nemertes Blog

When the COVID-19 pandemic caused work-from-home orders around the world, IT leaders and their teams acquired mounting responsibility to ensure millions of home workers have the hardware, apps and secure, high-performance connectivity they need to do their jobs.But in order to do that effectively, CIOs...

In my previous post, I pointed out that the Twitter hack was just an example of a phishing scam--the same old scam that's been around since the dawn of the Internet. The basic flaw is gullible (if smart) humans trusting people they shouldn't, for stupid...

  "Water, water, every where, nor any drop to drink." This line from Samuel Taylor Coleridge's The Rime of the Ancient Mariner could just as easily apply to CIOs seeking to fill crucial spots in their IT organizations. The world may seem full of systems engineers, network specialists...

The big news tonight is that Twitter was hacked, and the accounts of various celebrities (Elon Musk, President Obama, Warren Buffett, Kanye West, and many others) sent out bogus requests for Bitcoin to their followers. As of right now the damage is $10 million and...

As described in Security Magazine, "In recognition of the growing convergence of cyber and traditional financial crimes, the U.S. Secret Service is formally merging its Electronic Crimes Task Forces (ECTFs) and Financial Crimes Task Forces (FCTFs) into a single unified network, which will be known...

Even before the Covid-19 pandemic went global in the first quarter of 2020, organizations were already rapidly moving their unified communications applications, including calling, messaging, and meetings, to the cloud. Nemertes Research’s 2020 Cost Benefit Analysis: Workplace Collaboration and Contact Center global study of approximately...

' The right IoT database depends on the requirements of each IoT project. The first step to select a database is to factor in critical characteristics of IoT when selecting among database architectures. IoT technologists must determine the types of data to be stored and managed; the data...

Almost since the inception of the commercial Internet, security compromises exploiting the ability to hijack dynamic code content have plagued us.  I think cross-site scripting, a form of client-side attack, has been on OWASP's annual top 10 web security threat list since the list's creation. ...

' When it comes to implementing IoT initiatives, tech leaders should internalize one key lesson: IoT infrastructure matters. A growing number of organizations adopt IoT to achieve new goals and improve established processes, which testifies to the advantages that the technology can provide. More than two-thirds of organizations...

Like many industry watchers, I expected to see IT budgets plummet from the financial effects of the COVID-19 pandemic. Though there are changes to IT spending, they aren’t as bleak as they could be — driven in large part by the need to equip home...

The National Security Agency (NSA) recently issued a set of guidelines for configuring IPsec VPNs. You can read the guidelines here; the key points are the following: Reduce the VPN gateway attack surface Verify that cryptographic algorithms are Committee on National Security Systems Policy (CNSSP) 15-compliant ...

Businesses have been moving infrastructure and applications to the cloud for years, but others have remained skeptical about the merits. With concerns about management, performance, security, costs and keeping a competitive edge, CX leaders question whether they want to relinquish their tightly controlled contact center...