Protect the Critical Applications (Hacktivism #3)
avatar

Problem to Solve: What can we do to protect our organization from Hacktivism, specifically in the area of protecting our Critical Application Services? Have your business critical application services ever become “unavailable”? We have all had this happen at one … Continue reading

The Evolving Role of the Network in the Pharmaceutical Industry
avatar

Working in the greater Philadelphia area now for nearly 17 years has given me the opportunity to work with many of the large pharmaceutical companies located in this area. And one thing you learn quickly is how heavily regulated they … Continue reading

Fundamental Methods for Identifying and Mitigating DoS Attacks
avatar

Problem to Solve:  How can we best identify and mitigate Denial of Service (DoS) Attacks? Everyday, service providers and large enterprises are victims of denial of service (DoS) attacks. Over the last few years, Sony and Microsoft couldn’t deliver gaming … Continue reading

Protect the Highway – Critical Links (Hacktivism #2)
avatar

Problem to Solve:  What can we do to protect our organization from Hacktivism, specifically in the area of Critical Links and Infrastructure? Have you ever seen any of your critical business links that look a “little congested“? I bet that some of … Continue reading

Protect the Foundation – Critical Services (Hacktivism #1)
avatar

Problem to Solve:  What can we do to protect our organization from Hacktivism, specifically in the area of Critical Services? As we work from the bottom up in creating the strategy, I will admit that this topic may not be extremely “sexy”. But … Continue reading

Protect The House .. from Hacktivism (Series)
avatar

Problem to Solve:  What can we do to protect our organization from Hacktivism?  How can I use my Application and Network Performance Management tools to help assist? Nope, not starting this article out with 80’s movie reference, music video, silly … Continue reading

Baby Got TAPs !!
avatar

Problem to Solve: How can we guarantee the collection of network traffic that feeds our APM/NPM, Security, & Big Data tools inside of our production network? In my previous video blog, I discussed the use of SPANs with their associated pros and cons (“To … Continue reading

Fat, Drunk and Stupid No Way to Go thru Big Data
avatar

Problem to Solve – My company is starting a Big Data / “Internet of Things” initiative as a Business Strategy.     How can I use my APM/NPM tools in this strategic effort? Yes, yes, we all remember the classic movie, Animal House … Continue reading

Where is Your Secret Decoder Ring for Invalid Certificates??
avatar

Problem to solve – We are deploying a Public Key Infrastructure (PKI) at our company, but we have no means to tell if everyone is utilizing it properly. How can we find Invalid Certificates? Contributing Author – Robert Wright, Network Engineer with … Continue reading