Blog
October 11, 2018
Multiple Vulnerabilities in Juniper Products Could Allow for Remote Code Execution

DATE OF ISSUE: October 10th, 2018   SUBJECT: Multiple Vulnerabilities in Juniper Products Could Allow for Remote Code Execution   OVERVIEW: Multiple vulnerabilities have been discovered in Juniper products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in the attacker gaining control of the affected…

Read More

July 26, 2018
Securing IoT Requires Re-Imagining the Network for Utility Companies

Today’s utility industry is at a pivotal point in terms of embracing the future and letting go of the past.  According to the U.S. Energy Information Administration’s IEO 2016, the world’s energy consumption will rise by 48% by 2040.  This explosion in energy consumption combined with the investment in Internet of Things (IoT) technology, including…

Read More

July 17, 2018
Setting a Foundation for a Successful Cloud Migration Strategy

Transitioning to the cloud can be one of the most important steps an organization can take to grow their business and meet their goals. The technology can offer many benefits, such as faster time to market, scalable applications, agility, cost efficiency and more. However, when implemented, many cloud migrations fail because they do not fulfill…

Read More

April 18, 2018
10 things you must consider before choosing a cloud provider.

You may have some apprehension on moving your business to the cloud. You can see the benefits, but you still haven’t pulled the trigger. This is quite common with companies who did not come of age during the birth of cloud computing. You are used to managing and maintaining your own “on premise” solutions. You…

Read More

February 26, 2018
TOP 3 CLOUD SECURITY CONSIDERATIONS

Building on our last post, 3 Questions to Assess your Cloud Security Posture for Code Sharing, we thought it might be helpful to focus this post on the underlining security items that should be included when deploying and managing your cloud deployments. With cloud deployments continuing to expand and grow, many organizations are realizing that…

Read More

February 20, 2018
Avaya Loyalty2Together Program

What is Loyalty2gether? Through the new Loyalty2gether program, Avaya is offering CS1000 customers a variety of options to take your communications, collaboration and customer contact capabilities to a new level. There are flexible upgrade options with Avaya Aura® or Avaya IP Office™ in cloud, premise or hybrid deployments. Loyalty2gether is an opportunity to rethink the communications,…

Read More

January 15, 2018
2 Emerging Technologies in Cryptocurrency

For many the current Crypto markets spell big money in a rapidly developing market. We see calculated way to pick those coins destined to make a splash both in the monetary sense and in the tech world. Too often people see the crypto markets in dollar signs alone. Here is a great idea; look at…

Read More

January 4, 2018
Major CPU Security Vulnerabilities

On January 3rd, 2018, two serious security vulnerabilities were publicly acknowledged that could let attackers steal sensitive data including passwords and banking information. These vulnerabilities have been found in processors designed by Intel, AMD and ARM. The flaws, named Meltdown and Spectre, can possibly affect virtually every modern computer, including smartphones, tablets and PCs from…

Read More

December 19, 2017
Five Ways to Optimize Use of Google Cloud for Enterprise

Using an out-of-the-box platform like Google Cloud means harnessing the power of a very versatile “come and build it” cloud environment and tailoring it to a company’s particular business needs. Although these types of systems are made for convenience, they don’t do your work for you when it comes to designing use cases. Here are…

Read More

November 27, 2017
3 Questions to Assess your Cloud Security Posture for Code Sharing

With the recent Uber hack coming to light, the value and worth of code sharing comes to the forefront of the discussion. The main question for most organization is do you know if your teams are sharing and/or storing data in the cloud? If the answer is yes, then do you also have the ability to ensure…

Read More

1 2 3 7