Remote Remote .. It’s Work From Home We Go (Hacktivism #6)
avatar

Problem to Solve:  What can we do to protect VPN connections, remote employees working @ home, and B2B links from Cybersecurity / Hacktivism? Can you picture our happy dwarfs that work from home singing to themselves all day long “Remote .. Remote … It’s Work From Home We … Continue reading

Living with the Threat of Ransomware
avatar

Problem to Solve:  How can we go about searching for potential Ransomware activity before our organization gets attacked? The evolution of security for so many has become a reactionary series of response and recovery. The latest highly publicized exploit leaves … Continue reading

Would Homer Simpson Protect Virtualized Servers? (Hacktivism #5)
avatar

Problem to Solve:   What can we do to protect our Virtualized Server Infrastructure and Application Services against Hacktivism?   OK, I don’t know exactly what Homer Simpson thinks about virtualized servers, but do have a guess on his reaction. 🙂   So the … Continue reading

Protect Critical Unified Communications (Hacktivism #4)
avatar

Problem to Solve: What can we do to protect our organization from Hacktivism, specifically for protecting our critical Unified Communication services? Have you ever had the joy of experiencing your company’s voice communications become unavailable? Well, if you think about it, … Continue reading

Protect the Critical Applications (Hacktivism #3)
avatar

Problem to Solve: What can we do to protect our organization from Hacktivism, specifically in the area of protecting our Critical Application Services? Have your business critical application services ever become “unavailable”? We have all had this happen at one … Continue reading

The Evolving Role of the Network in the Pharmaceutical Industry
avatar

Working in the greater Philadelphia area now for nearly 17 years has given me the opportunity to work with many of the large pharmaceutical companies located in this area. And one thing you learn quickly is how heavily regulated they … Continue reading

Fundamental Methods for Identifying and Mitigating DoS Attacks
avatar

Problem to Solve:  How can we best identify and mitigate Denial of Service (DoS) Attacks? Everyday, service providers and large enterprises are victims of denial of service (DoS) attacks. Over the last few years, Sony and Microsoft couldn’t deliver gaming … Continue reading

Protect the Highway – Critical Links (Hacktivism #2)
avatar

Problem to Solve:  What can we do to protect our organization from Hacktivism, specifically in the area of Critical Links and Infrastructure? Have you ever seen any of your critical business links that look a “little congested“? I bet that some of … Continue reading

Applying Advanced APM to Healthcare, Part 4
avatar

Throughout our Patient Care Performance Management (PCPM) series, we have reviewed individual performance management categories. When I consider the notion of “Advanced APM”, I see it as APM (based in traffic flow data) combined with a “service based” mentality. This leverages APM+ metrics … Continue reading