Collaboration in the Cloud – A Unified Theory

In the first article of this series, I posited that a meaningful strategy for accomplishing collaborative work in the cloud can only be achieved by thinking more holistically than has traditionally been the case. The reality is that work collaboration that drives competitive advantage is a multi-faceted endeavor. It requires the adoption of multiple best-of-breed […]

Data security vs. network security: What should your business prioritize?

Many businesses that have allowed employees to continue working from home for the foreseeable future are aware that they need to update their cybersecurity. It’s likely that they have allocated some budget and IT resources to make those necessary changes. However, IT budgets are finite. Given the economic disruption of the pandemic, enterprises must strategically […]

The Disturbing Cyber Threat Targeting Medical Devices

Hackers have found another way to extort the medical community and their patients. There’s a disturbing trend of cyber-thieves targeting medical devices in doctors’ offices and hospitals. The very medical devices that provide life saving treatment are now being targeted by hackers – for profit. Just recently, researchers discovered a new version of MEDJACK, which is […]

Understanding Cyber Risk- Cyber Security

All modern organizations face some degree of cyber risk. Cyber attacks over the last several years have been steadily increasing, and have increased in both count and severity very recently. New technology and its implementation has become a common task for business small and large. Only recently have small and mid-size businesses realized the importance of securing […]

Cloud Computing Security

Cloud computing has quickly become a relevant technology within the information technology field over the past few years. This technology is powerful and useful but is a dual edge sword as security can become an issue quickly when placing data on web based storage servers. Information security is open broken up into C.I.A. (confidentiality, integrity, […]

Voltron: Disrupting DoD Cybersecurity With Artificial Intelligence

There is no greater maxim than speed is decisive in war. However, cyber warfare today is a mostly manual process. Humans scour code to find vulnerabilities and fix problems with patches. Humans evaluate whether a patch will maintain overall system functionality, and whether a patch is performant. Human attackers exploit unpatched systems or vulnerabilities that, […]