Brian Wheeler

Brian Wheeler

Financial Management Finds a Welcome Home Online

December 8, 2016

Cloud Based Financial Management The most cautious person in any organization is likely to be the CFO. After all, they’re the person who gets paid to ensure the company’s finances are protected from unwarranted risk. However, even the most risk-averse

Read More
Brian Wheeler

Common Web Mistakes – And How To Avoid Them

November 28, 2016

Common Cloud Mistakes One of the first lessons in order to avoid common cloud mistakes with anyone entering the tech field learns is that nothing is as simple as it appears to be at first glance. That lesson goes double

Read More
Brian Wheeler

3 Major Concerns For The Cloud

November 23, 2016

Concerns For The Cloud With the rise of cloud computing, different concerns about adopting the cloud have arisen over the years. In 2016, the top concerns are pretty similar to previous years, though some have become higher or lower priority

Read More
Gilad David Maayan
What is SASE (Secure Access Service Edge)? SASE (Secure Access Service Edge) is a term coined by Gartner to refer to a new architecture for networking and security that combines both functions into a single, ...
Gary Bernstein
Simplify Your Website Management with VPS Hosting VPS stands for Virtual Private Server, which is a type of web hosting service that allows businesses or individuals to host their websites and applications on a virtual ...
David Discenza
Four Ways to Improve Cybersecurity (Updated: December 9th, 2022 ) Cyber-attacks on businesses have become common place. In fact, it’s estimated that a cyber-attack occurs every 39 seconds. Who are the targets of these attacks? ...
Martin Mendelsohn
The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...
Gary Bernstein
The Dangers of Facial Recognition Technology Facial recognition technology has become increasingly prevalent in our daily lives, from unlocking our phones to boarding airplanes. While this technology may seem convenient, its implications go far beyond ...
Drew Firment
Stop Focusing on Cloud Adoption and Start Focusing on Cloud Maturity For the past several years, most organizations have made it their priority to shift much of their applications and data from on-premises to the ...
Tosin Vaithilingam
Divestitures: What to consider during the migration process "Divestitures require careful planning and execution, but they can create tremendous opportunities for companies to transform their businesses and unlock new growth potential." - Ginni Rometty, former ...
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...