Service Assurance in the Cloud
avatar

In my last article, I spoke of seeking advice and almost portrayed a level of caution when approaching cloud. The reality of the matter is, we all want what the cloud promises, an easier and more profitable platform for delivering services at … Continue reading

Cloud is A Modern Day Gold Rush
avatar

I absolutely love my job, and obviously have no qualms about telling people about it! On a daily basis, I help people solve complex business problems. Sometimes those business problems are rooted in human nature, not technology. When human nature … Continue reading

Looking for the Unknown Anomaly (Hacktivism #7)
avatar

Problem to Solve:  How can I use my APM NPM solution to better detect Unknown Anomaly conditions related to Cyber and/or Hacktivism?   “You have to learn the rules of the game. And then you have to play better than … Continue reading

Remote Remote .. It’s Work From Home We Go (Hacktivism #6)
avatar

Problem to Solve:  What can we do to protect VPN connections, remote employees working @ home, and B2B links from Cybersecurity / Hacktivism? Can you picture our happy dwarfs that work from home singing to themselves all day long “Remote .. Remote … It’s Work From Home We … Continue reading

Living with the Threat of Ransomware
avatar

Problem to Solve:  How can we go about searching for potential Ransomware activity before our organization gets attacked? The evolution of security for so many has become a reactionary series of response and recovery. The latest highly publicized exploit leaves … Continue reading

Would Homer Simpson Protect Virtualized Servers? (Hacktivism #5)
avatar

Problem to Solve:   What can we do to protect our Virtualized Server Infrastructure and Application Services against Hacktivism?   OK, I don’t know exactly what Homer Simpson thinks about virtualized servers, but do have a guess on his reaction. 🙂   So the … Continue reading

Protect Critical Unified Communications (Hacktivism #4)
avatar

Problem to Solve: What can we do to protect our organization from Hacktivism, specifically for protecting our critical Unified Communication services? Have you ever had the joy of experiencing your company’s voice communications become unavailable? Well, if you think about it, … Continue reading

Protect the Critical Applications (Hacktivism #3)
avatar

Problem to Solve: What can we do to protect our organization from Hacktivism, specifically in the area of protecting our Critical Application Services? Have your business critical application services ever become “unavailable”? We have all had this happen at one … Continue reading