Security

Gary Bernstein

The Impact of Social Media on Personal Privacy and Ways to Protect It

June 1, 2023

The Impact of Social Media on Personal Privacy In the age of information and technology, social media has become an integral part of our daily lives. It has changed the way we interact with one another and the way we

Read More
Stacey Farrar

How MSPs can resolve a patchwork of solutions

May 31, 2023

During the COVID-19 pandemic, most companies scrambled to make working with a dispersed workforce more manageable. From Zoom to Skype to Google Workspace and Microsoft 365, businesses adopted solutions that made working from home more seamless. For many companies, however,

Read More
Gary Bernstein

The Role of Encryption and VPNs in Protecting Online Privacy

May 25, 2023

The Role of Encryption and VPNs In today’s interconnected world, online privacy has become an increasingly important issue. With the ever-increasing amount of data being shared and stored online, it has become essential to take measures to protect one’s personal

Read More
Steve Prentice

Episode 20: Why inbound telephone calls are still vital to your business

May 23, 2023

A conversation with David Anandraj, manager of Product Management for the ecommerce segment of BCM One People like to think that everything we do is text based and that phones have much less value. But as David Anandraj says, “when

Read More
Gilad David Maayan

What Is the Kubernetes Ingress Controller?

May 18, 2023

Kubernetes Ingress Controller is a component within a Kubernetes cluster that manages the routing of external traffic to the appropriate services running inside the cluster. Ingress is an API object that defines how to route external HTTP and HTTPS traffic

Read More
Gary Bernstein

AI-powered identity verification: what businesses need to know in 2023

May 17, 2023

AI-powered identity verification Even if you don’t want to admit it, doing business online in today’s environment poses a greater risk. Criminals are constantly on the lookout for vulnerabilities to exploit, including hacking, data breaches, and other types of fraud.

Read More
Vladimir Fedak

What is the cloud pyramid: the layers of DevOps services

May 15, 2023

The layers of DevOps services We use cloud computing services quite a lot nowadays, yet many people don’t have a clear picture of the cloud structure in mind. This is what the cloud pyramid looks like. The cloud structure regardless

Read More
Ron Cadwell

Creating a cybersecurity disaster recovery plan

May 11, 2023

Cybersecurity Disaster Recovery Plan Continuation from Part 1 Disaster recovery is a subset of business continuity planning that focuses on restoring IT infrastructure after a disaster. A disaster recovery plan should comprehensively outline the procedures and policies that will enable

Read More
Ron Cadwell

How to Improve Cybersecurity and Ensure Business Continuity

May 2, 2023

Essentials to Business Continuity Planning Cyber attacks are no longer a fringe event that affects big businesses and government institutions only. In actuality, the question for each organization, no matter their size, is no longer if they will become a

Read More
Louis

How post-quantum cryptography will help fulfill the vision of zero trust

May 1, 2023

Lost in the debate over if, or when, a quantum computer will decipher encryption models is the need for post-quantum cryptography (PQC) to become part of organizations’ tech stacks and zero-trust strategies. Enterprises need to follow the lead Cloudflare has taken and

Read More
Ron Cadwell

Data Center Energy Efficiency: Innovations in Cooling and Power Management

April 20, 2023

The Future of Energy-Efficient Data Centers There is a saying that anyone who believes that exponential growth can last forever in a finite world is a madman or an economist. I would add the data center executive to this group. And who

Read More
Gilad David Maayan

AWS vs. Azure Pricing: A 2023 Guide

April 19, 2023

What Are AWS and Azure? AWS (Amazon Web Services) and Azure are two of the most popular cloud computing platforms currently available in the market. AWS is a cloud computing platform offered by Amazon that provides a wide range of

Read More
Maxim Melamedov

Unpredictability and the Unfulfilled Promise of Cloud Discount Programs 

April 18, 2023

Unfulfilled Promise of Cloud Discount Programs As companies seek to cut cloud costs, more are looking to take advantage of the saving opportunities provided by AWS discount offerings and avoid paying the hefty price tag for On-Demand. But what is

Read More
Ron Cadwell

Sustainable Solutions for the Data Center: Net Zero Emissions Designs

April 13, 2023

Net Zero Emissions Designs Sustainability has become an increasingly frequent topic of discussion for data center operators, with many pledging to be carbon-free as soon as 2030. But are these commitments a response to the threat of regulation, or are

Read More
Matt Hallett

The Rise of DCRs: A New Era of Customer Data Insights

April 12, 2023

Data Clean Rooms are Changing the Game for Marketers It’s no surprise that data clean rooms (DCRs) have become the go-to solution for customer insights. With the depreciation of cookies and growing concerns about data privacy, companies are rapidly switching

Read More
Martin Mendelsohn
The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...
Mark Ardito
OPEX is the new battleground I recently wrote in CloudTweaks about how cloud is forcing CIOs to work more closely with their C-suite colleagues to sell the benefits and its role as a business driver ...
Frank Suglia
Migrating Microsoft Office 2013 As of April 11, 2023, Microsoft will stop supporting Office 2013. The decision to end support for Office 2013 should come as no surprise. Over the past several years, Microsoft has ...
Gilad David Maayan
What Is Cloud Deployment? Cloud deployment is the process of deploying and managing applications, services, and infrastructure in a cloud computing environment. Cloud deployment provides scalability, reliability and accessibility over the internet, and it allows ...
Jen Klostermann
The Fintech Landscape The Nitty Gritty Although the COVID-19 pandemic has highlighted its existence, most of us have been using fintech in some form or another for quite some time. It’s a big part of ...
Sofia Jaramillo
Augmented Reality in Architecture Augmented reality (AR) is a growing field of study and application in the world of architecture. This useful tool can help us visualize architectural designs by superimposing them onto real-world scenes ...
Stacey Farrar
Modern Auth and Exchange Online Migrations Microsoft has phased out Basic Authentication (Basic Auth), replacing it with Modern Authentication (Modern Auth) to provide increased protection and user security. Through this, Microsoft has turned off Basic ...
Gary Bernstein
Common DevOps Misconceptions 86% of businesses say it’s important for their company to develop and produce new software fast to win market share and beat the competition, Harvard Business Review reveals. Yet, just 10% of businesses ...