If you’ve been in the technology business, you’ve been through the “Hype Cycle” of a variety of solutions, e.g.,...
Blog
BOTNETs: What They Are and What You Can Do
, Cool Tech, BOTNET, BOTNETs, Hacker exploits IE8 on Windows 7, IT, managed service provider orange county, network security, remote access, security, ssl, technology, virtualization, VPNDon’t be BOT and Sold – Winning…DUH! In malware-speak, a”botnet” is a collection of computers that are all infected with...
IPv6…All That You Know Is At An End…
, Security Tech, DHCPv6, DNS, echo request exploits, ELE, ICMP and multicast, IPv4, IPv6 IPv4 networks, IPv6 tunnels, IPv6 vulnerabilities, mandatory IPSEC, multicast, NDP, Network Advertisement, Network solicitation, QoS, Type 0 routing, VoodoonetAll that you know is at an end… – Silver Surfer No Soup for YOU! At a ceremony held on...
Cloud Security: Mission Impossible?
, Cool Tech, Security Tech, Amazon, architecture, Backups, challenges, Cloud, Cloud Computing, Cloud Security, data, Disaster Recovery, economic, Firewalls, Google, Host IDS monitors host, Intrusion Detection System, political, SAS 70 audit, security, server event/sys logs, SSAE 16, SunGuard, technical, troubleshootingWith today’s challenges, technical, economic, political, or otherwise, our brave IT Mangers stand at the precipice of a new...
It’s A Trap!: Fallacies of Managed Services
, Boring Tech, Security Tech, managed service, Managed Services, monitoring, msp, network securityIn a galaxy far far away… Information Technology day to day operational transactions have been the force behind the...
Go To the Mattresses: Network Monitoring!
, Boring Tech, Managed Services, Network monitoring, network securityOk, so you’ve invested a colossal amount of capital on a rock’n IT infrastructure to support even more expensive...
SQUEEZE BOX – The Music “IT” Dances To…
, Cool Tech, affant, IT, Managed Services, monitoring, network security, technology, virtualizationIn 1976, “The Who” published the suggestive lyrics of “Squeeze Box”, which to many who actually listened to the...
Demystifying SSL and IPSec Remote Access By Josh Linn
, Boring Tech, business, future, ipsec, IT, network, remote access, security, ssl, technology, VPNMany businesses are confronted with how mobile workers such as individual staff, vendors and consultants will gain remote access...
Top Three Biggest IT Headaches Anticipated for 2011
, Boring Tech, and Regulations, Budgets, Disaster Recovery, IT Security Infrastructure, Mobile ComputingPlease find the compiled results of our short survey. We asked 1500 IT executives “What are your top 3...