Category Archives: Security

To Migrate or to not Migrate: In-House vs. Outsourced Cloud Computing

To Migrate or to not Migrate: In-House vs. Outsourced Cloud Computing

In-House vs. Outsourced Cloud Computing Through working as an executive in the managed DNS industry for over 15 years, I have become a sort of expert in managing costs while also maintaining high performance and uptime standards. With the recent push the cloud, I have been urged to evaluate the cost efficiencies between operating an…

What You Need To Know About Choosing A Cloud Services Provider

What You Need To Know About Choosing A Cloud Services Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

Delusions of Adequacy: Why Presidential Policy Directive 41 Falls Short

Delusions of Adequacy: Why Presidential Policy Directive 41 Falls Short

Delusions of Adequacy President Obama’s recent policy directive on cybersecurity was eight years in the making. Unfortunately, its proposed actions are barely adequate to the massive task of defending against the onslaught of daily cyber attacks on U.S. companies and government agencies. The new document, Presidential Policy Directive 41, is supposed to improve government and…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal…

Identity And Access Management: Advancing To Meet The Changing Needs Of Passwords, Governance

Identity And Access Management: Advancing To Meet The Changing Needs Of Passwords, Governance

Identity and Access Management The identity and access management market continues to grow in a wide variety of industries of all sizes. As has been much discussed in many headlines, this is primarily because of three main reasons: 1) It is much more cost effective to implement than in past years; 2) Solutions can be…

The Future of Big Data and DNS Analytics

The Future of Big Data and DNS Analytics

Big Data and DNS Analytics Big Data is revolutionizing the way admins manage their DNS traffic. New management platforms are combining historical data with advanced analytics to inform admins about possible performance degradation in their networks. Not only that, but they also have the ability to suggest ways to optimize network configurations for faster routing.…