nDash.co is a content creation platform that provides brands and agencies with access to the world's top freelance writers.

nDash Writer Profile for Andrew Sanders

Andrew Sanders

Headline

Technology Copywriter

About Me

Writer on technology, information security, telecommunications, and more. 

Industries I Write About

Internet

Find writers and ideas in this industry

Computer Networking

Find writers and ideas in this industry

Telecommunications

Find writers and ideas in this industry

Information Technology & Services

Find writers and ideas in this industry

Computer Software

Find writers and ideas in this industry

Consumer Electronics

Find writers and ideas in this industry

Computer & Network Security

Find writers and ideas in this industry

Financial Services

Find writers and ideas in this industry

Computer Software

Find writers and ideas in this industry

My Writing Samples

Diagnosing (and Avoiding) the Top 3 AWS EC2 Issues

EC2 is extremely useful for business IT teams looking to assemble massive computing power without purchasing physical infrastructure, and for those that must prepare for regular spikes in customer demand. That being said, EC2 is a tool like any other. It’s prone to being misused or misconfigured, and if that occurs, your business could be left with nowhere to scale. Here's how to avoid the most common EC2 errors before your application starts to crash.

https://www.appneta.com/blog/diagnosing-and-avoiding-the-top-3-aws-ec2-issues/

The Role of the FDA in the Digital Health Monitoring Space

Many companies are now entering the digital healthcare arena, and some of them have a minimal background in creating medical devices. Other companies have stated outright falsehoods about the efficacy of their products. Yet more organizations are now facing legal pressure from consumers who believe they've been cheated by devices that don't work as intended. Given that companies are creating devices meant to diagnose or recommend solutions for patients, the FDA is becoming increasingly involved in health monitoring innovation. The more invasive the health monitoring device, the more involvement the FDA will have in the innovation process—especially in terms of clinical trial standards.

http://info.signalsanalytics.co/role-fda-digital-health-monitoring-space-lp

Will AI Be Smart Enough To Protect Us From Online Threats?

Here’s an idea: Let’s set our computers to defend our computers. Let’s build a computer strong enough, fast enough and smart enough to defend us all from hackers on its own. Can we do this? Probably not; and if it turns out that we can… we’ll end up in a be-careful-what-you-wish-for scenario. Let’s explore why artificial intelligence will probably never be smart enough to end cybercrime.

https://techcrunch.com/2015/10/29/will-ai-be-smart-enough-to-protect-us-from-online-threats/

Experience

Technology Copywriter

Create blogs, infographics, white papers, and other content related to various topics in technology, including IT, information security, telecom, networking, and more.

Company: nDash Marketing

I worked there from 3/2016 until now

Marketing Associate

Made use of Pardot and Umbraco to compose email campaigns and design website landing pages in order to advertise IANS events and research.

Company: IANS Research

I worked there from 9/2014 until 5/2015

Content I Write

Ideas and Pitches I Wrote

How Docker Improves on Container Security

Docker was originally designed for convenience, not security. In 2014, a whole spate of research came out to the effect that Docker was not safe for production due to the following reasons: Gives apps root access on desktops No trusted software repository No dedicated security response team No common set of certifications And so on This article will address some continuing security concerns regarding docker and containers in general.

Content type: Blog Post

Keywords: docker, containers, infosec, information security

Links:

How to Secure a Multi-Tenant Environment

If you offer cloud services to your customers, or if you're using a private cloud with applications that can only be accessed by privileged users, it's important to be able to share software and infrastructure without sharing the wrong data. This article will discuss some of the ways that enterprises must segment their databases and virtual machines, plus apply VMI in order to satisfy security and governance requirements in the cloud.

Content type: Blog Post

Keywords: multi-tenant, infosec, cloud, data center

Links:

DropBox Jumps Ship from AWS, While Netflix Climbs Aboard: What this Means for Private Cloud Adoption

Dropbox has almost completely moved its infrastructure off of AWS, and onto a private cloud. Netflix has divested from its infrastructure, and has entirely adopted AWS. It seems like the reverse should be true This piece will explore some of the reasons why each company has decided to make its particular decision and what this might mean for other companies willing to follow in their footsteps.

Content type: Blog Post

Keywords: dropbox, cloud storage, AWS

Links:

Helping Without Hands: Programming Personality into a Limited Moveset

Functionally, Jibo consists of a screen and a three-axis motor—which means there aren't a lot of ways for Jibo to get around. Yet with just a few moving parts, Jibo has been able to convey a huge amount of personality. Here are a few of the different moves we've programmed into Jibo (possibly alongside snippets from GitHub), that allow him to come to life.

Content type: Blog Post

Links:

You've Got a Tweet! Connecting Jibo with Outside Applications

As an internet-connected device, Jibo is capable of taking a literally infinite number of actions in response to an infinite number of prompts. Here's how to use the Jibo Atom package, API calls to external web services (such as Twitter), and other methods in order to make Jibo react to outside stimulus.

Content type: Blog Post

Keywords: Robotics, Development, APIs

Links:

Anti-Phishing Working Group Releases Q1 2016 Report

As of early 2016, the APWG has seen signs of a massive escalation in phishing attacks, with known phishing sites increasing from 48,114 to 123,555 from October to March. Retail services were by far the most heavily affected. What's the reason for this massive surge in attacks, and how can brands protect themselves?

Content type: Blog Post

Links:

Skill Gap in Security

As of 2015, there's a potential shortfall of three hundred thousand information security professionals—and that number isn't dropping. MSPs can capitalize on this gap by offering SaaS based security products that are easy to implement and use. Plug MSP Edition Barracuda Firewall.

Content type: Blog Post

Links:

MSP are Missing Out on Cloud Adoption

In spite of massive cloud adoption by SMBs, a lot of MSPs are pushing SaaS services only if requested by their customers. By not switching to cloud applications by default, however, these enterprises are missing a valuable opportunity to broaden their skills. More to the point, as customers turn their attention to MSPs with more robust cloud offerings, traditional providers will lose out on revenue.

Content type: Blog Post

Links:

End of an Era: Microsoft Deep-Sixes Skype's P2P Client

Microsoft is doubling down on Skype's cloud implementation, and will eventually rout all call traffic through the desktop giant's cloud servers, nixing the P2P architecture which once definted the program. In addition, it is now winding down the native Skype apps for both Mac and Linux—users of these platforms will shortly have to use Skype only through their browser. What are Microsoft's aims as it streamlines this application, and what are the ramifications for enterprise users?

Content type: Blog Post

Keywords: Skype, VoIP, UC

Links:

Ten Percent of VoIP Calls are Now Made Through Facebook

Facebook's Messenger App has recently surpassed one billion users. This app integrates both chat, video, and voice, making it a true UC hub for both desktop and mobile. The company now claims over ten percent of all VoIP traffic is through Facebook messenger, and with increases in call features and call quality on the way, the logical next step is to target the enterprise.

Content type: Blog Post

Keywords: UC, VoIP

Links:

Eighty Percent of Enterprises Experience SIP Trunking Issues

SIP adoption is accelerating, but that doesn't mean that enterprises are experts at it. Many enterprises experience difficulties configuring their SIP trunks, or figuring out interoperability issues. Although this sounds worrisome, it's actually the perfect opportunity for service providers to step in and offer their expertise.

Content type: Blog Post

Keywords: SIP trunking,

Links:

Boosting Productivity with UC

According to a recent Google Consumer Survey, workers waste an average of two hours per day on communications tasks--sending redundant emails, calling people who don't pick up the phone, and so on. The genius of unified communications is the find-me-follow-me function that sends all emails to a central hub on the phone that happens to be closest to the user. Here's how to support UC with EWN.

Content type: Blog Post

Keywords: Unified Communications, Productivity

Links:

New App Boosts Videoconferencing Security

Ensuring the privacy of videoconferencing participants can be a tough proposition. Some recommendations include having a dedicated videoconferencing room with no windows, that's locked when not in use. Now, researchers from Duke university have created a VC app that can help participants breathe a little easier—by automatically blurring sensitive information.

Content type: Blog Post

Keywords: Videoconferencing

Links:

DaaS White Paper

Outline TBD

Content type: Whitepaper

Keywords: DaaS, Desktop, MSP

Links:

Digital Forensics White Paper

Outline TBD

Content type: Whitepaper

Keywords: Digital Forensics

Links:

Broadsoft Solution Brief

Broadsoft SB

Content type: Article

Links:

Securely Communicating with Partners and Vendors

Just what it says on the tin.

Content type: Blog Post

Links:

Digital Forensics

Why it's hard for SMBs to do adequate digital forensics and incident response.

Content type: Whitepaper

Links:

Digital Forensics

Yatta yatta yatta

Content type: Whitepaper

Links:

Next Gen Endpoint Protection Part 4

The fourth one, obviously.

Content type: Blog Post

Links:

2016 Election: A threat timeline

Timeline of cybersecurity threats during the 2016 election.

Content type: Blog Post

Links:

Safe-T Box and the DNC Hack

How to prevent your emails from ending up on WikiLeaks.

Content type: Blog Post

Links:

Safe-T Box in the State of Indiana

Talk about the use-case for Safe-T Box/RSAccess in state government

Content type: Blog Post

Links:

Protecting an Electoral System

Evolution of the electoral system, vote-rigging, and how one might replace an electronic voting system with RSAccess.

Content type: Whitepaper

Links:

S1 Credit Union White Paper Edit

Edits for a previously completed WP on credit unions. Took about two hours.

Content type: Blog Post

Links:

Broadsoft Integration Solution Brief

How Edgewater Networks solutions integrate with the Broadsoft Application Suite.

Content type: Article

Links:

Edgewater Networks Report Server Service Description

Installing and configuring report server for Edgeview

Content type: Blog Post

Links:

Defying Obstacles, Municipal Fiber Optic Networks Make Inroads

While broadband internet is still steadily conquering the world, its reach still hasn't penetrated into some of the more rural areas of America. Some towns and cities have struck back by building their own fiber networks. These projects aren't without difficulty—at the extreme end, some states have actually passed lobbyist-sponsored bills banning municipal fiber networks— but several towns and cities are starting to get it done.

Content type: Blog Post

Links:

Election Threat Series: The Danger is Officially Real

At first, there were only vague rumors that the election would come under threat. Then, Anonymous declared war on Donald Trump. Shortly afterwards,leaked emails from the DNC nearly sunk the Clinton campaign. Influencing poll results are one thing—but influencing election results is another, and it looks like that milestone has finally been crossed. The FBI has just warned that state election systems in Arizona and Illinois have been compromised by Russian hackers. Is the general election next?

Content type: Blog Post

Links:

For Businesses, Most Suffer an Attack First, Then Shop for MSSPs

A survey conducted jointly by Raytheon and the Ponemon Institute reveals that while many companies have prepared detailed incident response plans to deal with a cyber breach, a startling number still haven't. A large majority have said that they wouldn't consider engaging third-party help until after a breach occurred. For business, and especially small businesses without much experience in security—third party support can ensure that an attack never occurs in the first place.

Content type: Blog Post

Links:

Ransomware Now Spreading Through the Cloud

A new report from Netskope shows that much of the malware now spreading through the cloud is comprised of ransomware. Due to the uncontrolled growth in SaaS applications, these services are particularly vulnerable to ransomware attacks. Particularly, they are subject to what's known as a watering-hole attack, wherein an attacker uploads a malicious file to a service such as Dropbox, and then syncs it to their target's browser and mobile devices.

Content type: Blog Post

Links:

Making the Sale: MSPs vs. Staff Augmentation

Right now, staff augmentation—the practice of offering trained personnel to work in-house at a customer site—is gaining traction as a service offering. If you're an MSP that only does software-based remote monitoring and management, how do you compete against the appeal of staff augmentation? This article will run down some of the ways that MSPs have positioned themselves against staff augmentation orgs.

Content type: Blog Post

Links:

The Four Pillars of VoIP Vigilance

Based on a recent brain dump call with Lars. Service providers focus on protecting their core with SBCs, but network security must be considered holistically. This WP will lay down the 4 pillars of VoIP—and by extension network—security: Authentication, Integrity, Confidentiality, and Non-Repudiation.

Content type: Whitepaper

Links:

The Second Wave of Digital Disruption—Technology that Retailers Must Know About

Announcing UserReplay's new machine learning feature.

Content type: Blog Post

Links:

The Changing Face of Unified Communications

Google is purchasing Ringcentral, Facebook has purchased WhatsApp, and Microsoft is turning Skype for Business into a Slack competitor. Across the board, it feels like companies that you wouldn't traditionally associate with unified communications are gunning hard for marketshare. What's driving this transition, and how should service providers adjust to this new reality?

Content type: Whitepaper

Links:

Leaked NSA Tools Are Already Being Used by Bad Actors

You may remember that few months ago, some attackers broke into NSA servers and dumped those hacking tools on the web. Now, we have proof of those tools being used in the wild. Chinese hackers are now using NSA tools to target CISCO firewalls and other equipment.

Content type: Blog Post

Links:

VoIP as Productivity Tool: Skype vs. Slack

Coming soon, Microsoft prepares to unveil Skype Teams. Integrating chatbots, group messaging, and more, this new Skype variant is expected to compete directly with Slack. Is this the future of VoIP?

Content type: Blog Post

Links:

Encryption Now a Killer App for VoIP

Usually an abstract issue , encryption has now come to the fore in voice calls. Google Allo and other popular UC apps such as Redphone are beginning to offer built-in encryption to their VoIP calls. Learn how these apps handle encryption on the technical side, and why service providers should take notice.

Content type: Blog Post

Links:

VoIPTalk Admits Possible Hack

VoIPTalk, a major European VoIP Service provider, admitted last week to a possible data breach. SIP and VoIP passwords may have both been stolen, leaving attackers vulnerable to call fraud. Although breach has yet been confirmed, VoIPTalk's incident response plan is a model that other service providers should examine for clues.

Content type: Blog Post

Links:

Top Four KPIs for Retailers in the Digital Age (Part 1)

Top four KPIs for retailers

Content type: Blog Post

Links:

Four More KPIs for Retailers (Part 2)

Continuation of first article

Content type: Blog Post

Links:

What are Insurers doing about improving CX and why should it matter

The financial services industry has been criticized for its lack of agility and inventiveness in the wake of digital disruption. It has been suggested that digital teams at Insurers / Insurance companies can improve the digital research and buying experience for prospects, by looking at the strategies and tactics digital teams in other industries have been using to succeed, especially in Retail.

Content type: Blog Post

Links:

WP Edit: Industrial Control Systems

Edits for the industrial control systems white paper.

Content type: Whitepaper

Links:

The Biggest Threat to Information Security? Not Enough Employees

Credential theft and employee malfeasance have been, and continue to be, the biggest security risks for enterprises. Not only does it appear to be impossible to train employees to the point where they will behave according to good security practices, there's a second problem: a dearth of trained security personnel means that there typically aren't enough workers to monitor them. The solution? Better tools.

Content type: Blog Post

Links:

Firefox Clamps Down on Weak Encryption

Having strong encryption isn't just a requirement for good security. Increasingly, it is a requirement for doing business. For example: an encryption protocol known as Diffie-Hellman has been steadily rising in popularity as a replacement for TLS. Sites which use a weaker 512-bit version of Diffie-Hellman keys, however, are vulnerable to an attack known as LogJam. Now, Firefox, the popular internet browser, is beginning to block sites that use these low-security keys.

Content type: Blog Post

Links:

Why Are Hackers Successful? They Think Like a Business

Hackers are clever, and the best of them aren't just lone wolves—they're institutions. They possess specialized, purpose-built infrastructure in the form of bulletproof hosting sites. They can rapidly re-iterate and update their malware in order to exploit advantages faster than defenders can patch their systems. In short, enterprises are facing down the weaponized version of an agile startup.

Content type: Blog Post

Links:

Combine ERP and CRM for Low-Cost Customer Satisfaction

Whether you sell to businesses or consumers, having a window into the minds of your clients is vital to continued engagement. Research shows that companies which integrate ERP with CRM have a 97% customer satisfaction rate. This piece will show the reasons why companies that integrate these tools are market leaders—and how Bedrock Data can help enterprises achieve this integration.

Content type: Blog Post

Links:

Considering SaaS? Here are (N) Things to Look Out For

SaaS is going to be a $31 billion market by the end of 2016, but that's not an excuse to blindly jump on board. If your business is switching to SaaS, or you're bringing another SaaS tool onboard, there are a number of items to consider. What kind of SLA are you getting? Does you SaaS provider offer training? Can you integrate your new SaaS product with other business systems?

Content type: Blog Post

Links:

Artificial Intelligence—The Next Wave in CRM?

It is difficult to predict which opportunities will turn into deals—and humans are notoriously bad at prediction in any event. A new wave of startups aims to change this by using predictive scoring—applying insights from machine learning to lead sales teams to more likely prospects. How does this work—and will these artificial insights spread to other SaaS technologies?

Content type: Blog Post

Links:

Half of All Internet Users are Robots

'Bots are what make the World Wide Web go 'round. Nearly half—about 45%—of all users on the internet are just computer programs, and they account for nearly 20% of all traffic. Some of this traffic is definitely malicious—responsible for DDoS attacks, eavesdropping, MITM, and more. What can enterprises do to detect and mitigate malicious bots?

Content type: Blog Post

Links:

In a High-Demand Information Security Market, MSSPs Win Big

If you're a trained information security professional, you're probably in line for an extremely cushy gig. The current demand for information security professionals now far outstrips supply. Companies who lack the budget to hire full-time security administrators are now turning sharply towards MSSPs. Here's how providers can take advantage.

Content type: Blog Post

Links:

Putin Trolls Seek to Neutralize Anti-Trump Media

You may recall a story from a week ago, in which it was revealed that Donald Trump broke the Cuban embargo during the late 90s. If you're unclear on the specifics of that story, it's because Newsweek, the site hosting the article, was crashed by a DDoS attack—with IP addresses mostly pointing towards Russia. The attack definitely had an affect--a recent CNN survey says most voters still haven't heard of the story.

Content type: Blog Post

Links:

New Malware Spreads via Spotify Ads

The free version of Spotify is ad-supported—and those ads are now malware enabled. A recent malvertising attack led several Spotify users to websites with suspicious pop-ups. This kind of attack illustrates how any ad-supported service can now be a vector for computer viruses.

Content type: Blog Post

Links:

Downsides of Traditional Endpoint Protection: Mass Surveillance

Many webmail clients offer free antivirus protection—but they may be scanning for things other than malware. A report from the New York Times indicates that that Yahoo's mail client was scanning for suspicious text strings in addition to malware—then copying those messages and sending them to the FBI. This shows that users should only depend on EPP that's controlled by an admin they know or trust.

Content type: Blog Post

Links:

New POS Malware Abandons Stealth

There are two kinds of POS malware—there's kind that stealthily encrypts and exfiltrates stolen data, and then there's the kind that smashes and grabs. A new version of the FastPOS malware has chosen the latter approach, grabbing massive amounts of CC data, and sending it out to command and control servers in plain, unencrypted text. The reason this works? Most endpoint protection still doesn’t notice.

Content type: Blog Post

Links:

The Employment Crisis in Information Security

Here's a sobering bit of data: there is an employment crisis in information security. By 2019, there will be 6 million job openings for information security professionals—but only 4.5 million security professionals to fill those roles. That's a vast shortfall, especially for an industry that literally helps protect critical data—it's like learning that the US military is missing 1.5 million soldiers. How can enterprises protect themselves despite staffing constraints?

Content type: Blog Post

Links:

The NIH for InfoSec?

Individual responses to information security crises just aren't cutting it. Security researcher Dan Kaminsky has proposed to solve this problem by creating an organization that acts as a sort of "National Institute of Health" for information security—"a publicly funded research institution that figures out how to prevent and cope with large-scale security issues in networked devices"

Content type: Blog Post

Links:

WP Edit: Higher Ed White Paper

A four-hour edit at $100/hour.

Content type: Whitepaper

Links:

Ancient Vuln Hamstrings IoT Security

Deep inside the memory of home computers, buried in firmware of insecure routers, and now inside the burgeoning IoT itself—botnets are everywhere. Security researchers have discovered that an SSH vuln dating back to 2004 has allowed hackers to create a network of zombie computers, which recently brought down Krebs on Security. This incident represents yet another reason why it may be dangerous to adopt new technology that's built on legacy software.

Content type: Blog Post

Links:

VoIP Blackout—How a Single Configuration Error Turned off VoIP for Most of the US

VoIP is supposed to be about as dependable as old-school landlines, nowadays. This doesn't prevent a single error from causing the occasional massive screwup, however. On October 5th, a configuration error on the internet backbone prevented VoIP packets from connecting across the United States. Incidents like these prove the case for continued advanced monitoring capabilities.

Content type: Blog Post

Links:

Videoconferencing May Sound the Death Knell for Business Travel

Some business can't be accomplished without an in-person meeting—but (to borrow a phrase) for everything else, there's videoconferencing. 'Round the world travel is undeniably expensive, and a new survey suggests that organizations could save an average of $33,000 a year by switching to video. For larger enterprises, with more employees who travel often, the savings could be even higher.

Content type: Blog Post

Links:

Deep Learning in CXA

Talking about deep learning technology integration in CXA.

Content type: Whitepaper

Links:

Introducing Nexidia Text Analytics

Create a messaging hierarchy wherein Nexidia's deep learning capabilities are introduced to Nice Systems users and prospects

Content type: Article

Links:

Let's Start Talking About Donald Trump's Servers

Over the course of this very long election, we've been hearing a lot about one candidate's emails—and almost nothing about the other. That might change, now that it's been revealed that servers belonging to the Trump Organization are running end-of-life software dating back to 2003. This article will talk about this, and why it is such a potentially dangerous practice.

Content type: Blog Post

Links:

In the Context of Floods, Small Businesses Turn to Cloud Backup

Over the last year, businesses in flood-prone areas from Florida to North Carolina have been dealing with a series of natural disasters. Floods destroy physical hardware, which means that the most intangible assets are also the most secure. For this reason, businesses are turning to the cloud as a flood-proof form of data insurance.

Content type: Blog Post

Links:

E911 Standards for IP Phones and Softphones

Customers have been able to make 911 calls from VoIP phones and applications for awhile now. The standard that allows service providers to support 911 calls can be murky, however. I'll use this blog to explain the enhanced 911 standard at a high level.

Content type: Blog Post

Links:

VoIP Usage and the Growing eSports Market

It's been a long time coming, but professional videogames are finally having their moment. The market for eSports is now over $500 million and growing—and VoIP service providers may be able to get a piece of it. Professional gamers often use VoIP services to communicate long-distance during tournaments, which is why services which cater to them, such as Discord, are booming.

Content type: Blog Post

Links:

Big Telecoms Begin Push for SDN

At this year's Open Networking User group conference, executives from both Yahoo and Verizon pushed the idea that businesses need to be ready for SDN. The transition is definitely happening, but Edgewater Networks believes that the Intelligent Edge is a more important piece of foundational infrastructure for SMBs.

Content type: Blog Post

Links:

Hackers Already Improving on Mirai Botnet

Remember the massive internet outages in mid-October? Prepare for them to get even worse. Hackers are already working on the next generation of botnet designed to take over IoT devices and bring down the internet.

Content type: Blog Post

Links:

Security Researcher Trolls Ransomware Author

Not all ransomware is created equal. A security researcher was able to use a leaky connection between a ransomware variant and its C&C server to steal back ransomware encryption keys and help numerous victims. Although incidents like this are fairly rare, it's a promising ray of sunshine in a year when the news about ransomware is mostly bad.

Content type: Blog Post

Links:

What Are "Booters" and "Stressers" -- and Why Should You Worry?

On the internet, everything can be done for a price--and that includes hacking. Booters and stressers are online darknet marketplaces that sell hacking services. They'll take sites offline either through malware or DDoS attacks, and although their prevalence might be fading, they're definitely no less dangerous.

Content type: Blog Post

Links:

The Move from the Backbone to CDNs, and What this Means for Voiptech

CentruyLink is buying Level 3. Netflix is eschewing ISPs for IXP data centers. All over the telecom market, companies are moving from the backbone to the crossing points of the internet. As the centrality of the backbone begins to decline, how can service providers adjust?

Content type: Whitepaper

Links:

Are Content Communities the Next Form of UGC?

A thought-provoking post on whether or not receiving ideas from a content community is the next form of use generated content. Showcase why and why not this is true, and leave it up to the reader to decide (keep it open-ended).

Content type: Blog Post

Links:

In IAM Fail, PayPal Let Attacker Bypass 2FA

Two-factor authentication is supposed to be the cornerstone of a good IAM strategy, but companies keep screwing it up. Text-message-based 2FA is already considered insecure, for example. Now, a security researcher has discovered another failure in the way that 2FA was implemented at PayPal. This article will run down the specific failure, and what other companies should take away from this.

Content type: Blog Post

Keywords: two-factor authentication, 2FA, IAM

Links:

Video Security Means Protecting Your Webcam from Botnets

Internet-connected devices are all the rage, but their security is somewhat lacking. According to security firm ForeScout, the vulnerabilities in videoconferencing equipment and VoIP phones makes them perfect for integration into a botnet. Learn how to make sure your telecom equipment doesn't become a platform for a DDoS attack.

Content type: Blog Post

Links:

Election Hacking: VoIP Edition

Technologically, a lot of people tried to put their finger on the scale for Donald Trump this election. While the much-feared direct interference with vote tallies most likely did not occur, there is one hack that may have moved the needle in his direction.

Content type: Blog Post

Links:

Why Most "Next-Gen AV" Falls Short

Most forms of Next Gen AV addresses very advanced forms of protection against traditional malware--but no protection against file-less malware, malicious scripts, or exploits. Why does this protection fall short, and what are the dangers?

Content type: Whitepaper

Links:

Mirai Botnet Attacks Prove that an Insecure IoT Can't Last

When an entire internet backbone goes down because of your product, you may have a problem. The Mirai botnet tied together tens of thousands of compromised IoT devices and wreaked havoc for a day. Now it's source code is freely available on the darknet. The burden is now on systems administrators to secure their IoT implementation before they become the payload for yet another attack.

Content type: Blog Post

Links:

Municipal WiFi is About as Secure as You Think it is

Free WiFi is great… if it's safe. But if free WiFi isn't safe in coffee shops and bars, how safe is it when it covers an entire city? An Israeli hacker just demonstrated the ability to use a single buffer overflow attack to compromise every free WiFi user in the entire city of Tel Aviv. Therefore, if you're in a city with free WiFi access, your security concerns just multiplied.

Content type: Blog Post

Links:

People Love Free WiFi—Even Though They Know it's Not Secure

According to the WiFi company Xirrus, a staggering 89% of business users use public WiFi, even though 91% of them believe it's insecure. Clearly, this is a problem for information security personnel, who must constantly educate their users. Using security awareness techniques, as well as tools like Pwnie Pulse, administrators can demonstrate best practices for WiFi security.

Content type: Blog Post

Links:

Kill Chain White Paper Edits

Edits for "Evaluating Endpoint Security Solutions Across the Cyber Kill Chain." These took four hours.

Content type: Whitepaper

Links:

Manufacturing Visibility Seen as Key to Success

According to research from Aberdeen Group, manufacturers that excel at data collection also excel in business. Data collection is about more than warehousing figures—it's also about getting that data to the individuals who can interpret it in helpful ways. Top-performing companies (with low maintenance costs and high operating margins), are 63% more likely to use historical data for actionable intelligence, and 38% more likely to use their data as fodder for high-quality analytics.

Content type: Blog Post

Links:

Can Manufacturing Companies Attract Software Developers?

Software developers are in extremely high demand—to the point where there are now hundreds of thousands of open jobs in the. Many developers, even those with limited experience, have found high-paying jobs in the tech field while manufacturers languish. This article will cover a few steps that manufacturers can take to start attracting young software developers back into their ranks.

Content type: Blog Post

Links:

In the Internet Age, Crime Still Doesn't Pay

Break the internet, pay the price. You may remember the DDoS attacks that brought down the internet in mid-October. You may have even been personally affected by it. But now, many of the gang members behind these attacks have been arrested. This article will discuss how the hackers were caught, as well as other high-profile hacker arrests.

Content type: Blog Post

Links:

What is Cloud Communications, and What's the Benefit?

This article will discuss trends in the cloud communications space such as: 1. Most enterprises are using a provider-owned cloud model. 2. The prevalence of conferencing as a cloud-communications use-case. 3. Growth of Cloud PBX, UC, and call center apps. Most points adapted from the 2016 NoJitter survey linked below.

Content type: Blog Post

Links:

Nice Systems QM Brochure

Helping enterprises act on the insights gained from voice and text analytics

Content type: Article

Links:

Complaint Management

Complaint management brochure will now de-emphasise regulatory compliance requirements and focus on trend analysis

Content type: Article

Links:

Ransomware Bricks SF Muni

Over the weekend, the San Francisco Municipal Railway was comprehensively hacked. Its fare terminals were attacked by hard-drive encryption ransomware, meaning that they could no longer accept fares, and that commuters were able to ride for free. Although the Muni appears to have un-bricked their fare terminals without paying a ransom, this action sends a dark message about the ease with which ransomware empowers hackers to damage critical infrastructure.

Content type: Blog Post

Links:

Mobile Devices and e-Discovery

Mobile devices present an interesting challenge for legal practitioners. These devices may contain more fruitful communications than most run-of-the mill corporate endpoints. What collection strategies should firms use to pursue data from mobile devices?

Content type: Blog Post

Links:

Not Seen on CSI: The Real Art of Digital Forensics

This blog will involve some of the detailed steps that go into computer crimes investigation. E.g., the use of "hot plugs" -- devices that allow investigators to transport computers while they're still running. This prevents the devices from falling into an encrypted state. I'd also want to explore the use of tools such as EnCase. The point would be to differentiate between commercially available "forensics" tools (normally bundled with AV software), and the very specific tools used by LE.

Content type: Blog Post

Links:

Mobile Devices and e-Discovery

Mobile devices present an interesting challenge for legal practitioners. These devices may contain more fruitful communications than most run-of-the mill corporate endpoints. What collection strategies should firms use to pursue data from mobile devices?

Content type: Blog Post

Links:

The Rise of the Micro-Influencer Market

Marketers have always known about long-tail keywords: lengthy, highly-specific phrases that will always bring a steady small amount of traffic—and which are easy to rank in. This same philosophy is driving the idea of "micro influencers." There are individuals—usually with less than a thousand followers—who are being tapped to represent gigantic brands.

Content type: Blog Post

Links:

The Future of Inbound Marketing is Machine Learning

Don't you wish that you could instantly generate a copy of your ideal customer? You can't, but machine learning can provide an increasingly precise approximation. Automated voice and text analysis can create persona profiles and begin to interpret how your target audience responds to your message. Let's learn a little more about the ways that AI is about to transform marketing.

Content type: Blog Post

Links:

Fintech Subject to Fed Scrutiny

Innovations like the blockchain and microcredit have shown tremendous promise within the financial sector, but they still need to interact on some level with that ancient institution, the Federal Reserve. The Fed has been scrutinizing Fintech startups with the aim of assessing any potential for fraud or crime. A new report, expected soon, will contain details on viability—with the potential of even piloting a digital version of the US dollar.

Content type: Blog Post

Keywords: fintech, blockchain

Links:

PGP Is Dead: Long Live Secure Emails

PGP used to be the gold standard of secure emails—but not any more. Drawbacks include a clunky interface, high-effort key maintenance, and message size allotment (PGP will increase the size of a 2 MB attachment by a factor of 10.) Learn why the enterprise has outgrown PGP, and a new solution is needed.

Content type: Blog Post

Links:

Are you securing your Google Drive?

Google Drive is pretty secure on its own--but it's not airtight. Notably, its on-board encryption feature keeps a copy of your encryption keys client-side with Google. In other words, Google can read your documents, even if others can't. Let's learn about a few secure alternatives to google drive.

Content type: Blog Post

Links:

Is Dropbox For Business Really Safe?

Dropbox has a large number of features for enterprise clients, but those features are often light on the security side. Learn how to add more granular GRC controls to online storage.

Content type: Blog Post

Links:

Adding a security jacket to Office 365

Office 365 is a challenge for compliance. On the one hand, it's used to generate most companies' unique IP—but on the other hand, it has barely any IAM or GRC tools baked in. How can enterprises make this application more secure?

Content type: Blog Post

Links:

Ensuring your security solutions are PCI compliant

Keeping your company ahead of regulators.

Content type: Blog Post

Links:

Can You Send Secure Contracts to Customers?

Judging by recent attacks on M&A firms, contracts are one of the most lucrative targets for hackers looking to make a buck via insider trading. Here's how to lock down your contracts so the criminals can't get at them.

Content type: Blog Post

Links:

Can anyone see your health information?

Learning how to enforce HIPAA with automatic policy enforcement.

Content type: Blog Post

Links:

Hunting C2 Traffic

Using insights from the beaconing guide and the C2 webinar, I'll write a distilled summary of methods for identifying C2 traffic.

Content type: Blog Post

Links:

The Security Gap in Uncovering Threats

Using Matt's diagram, unpack the gap we see in detecting threats based on hackers' emergent capabilities.

Content type: Blog Post

Links:

Diamond Fox Blog

How to find DiamondFox bots lurking on your network.

Content type: Blog Post

Links:

Diamond Fox Blog

Same as before

Content type: Blog Post

Links:

How to Prevent Ransomware from Decimating Your Network

Preventing ransomware, with a spin on network segmentation and 3rd-party vendor monitoring.

Content type: Blog Post

Links:

Ransomware: What's Come Before, and What's Next

Covering the evolution of ransomware, and how companies can protect themselves.

Content type: Blog Post

Links:

NICE systems landing page

LP for interaction analytics page

Content type: Article

Links:

Replacing AV--Whitepaper Edits

Edits for the replacing AV whitepaper. This took roughly four hours.

Content type: Article

Links:

Nexidia 12 LP

Landing Page for nexidia 12 product launch

Content type: Blog Post

Links:

Nexidia LP

Nexidia 12 Product Page

Content type: Blog Post

Links:

Securing the Healthcare IoT

Experts have long warned that network-connected medical devices are ripe for hacking. The idea of hackers attacking a wireless insulin monitor seems scary on its face—but until now, manufacturers and hospitals have had no uniform guidelines regarding how to protect them. Now the FDA has stepped in, but do their new recommendations go far enough?

Content type: Blog Post

Links:

Hospitals Pwned by Obsolete Malware

Hospitals are rapidly modernizing their systems, but their core equipment is likely to be still running unsupported operating systems like Windows XP. This has created an opening for clever hackers. By default, most EPP systems will ignore malware that can't affect them (stuff that tries to target patched vulns). This malware is then allowed onto the network—where it executes on expensive medical devices.

Content type: Blog Post

Links:

Avalanche Crime Syndicate Shut Down

Remember the Hollywood Presbyterian Hospital? on of the first in the wave of healthcare ransomware victims in 2016, it was forced to pay $17,000 in bitcoin before its records could be unlocked. Fortunately, however, a rare measure of justice has been achieved—the hospital's attackers have just been shut down, resulting in dozens of arrests.

Content type: Blog Post

Links:

What Does Intercloud Shutdown Mean for Communications Service Providers?

Cisco is shutting down Intercloud—and this might make CSPs nervous. The cloud collaboration service is essentially next door to HCS and Spark, which many CSPs use to provide turnkey UCaaS services. Could these be next on the chopping block?

Content type: Blog Post

Links:

Think VoIP Troubleshooting is Difficult in the Cloud? Just Wait Until You See the Fog

Cloud computing is barely in its adolescence—but it may already be giving way to its descendant. Fog computing may be upon us, essentially a new computing layer that exists to bring centralized processing power closer to edge devices. As the IoT becomes more and more numerous, the imposition of the fog may become necessary—but are you prepared to support it?

Content type: Blog Post

Links:

Why SIP Attacks are Child's Plat

From the source link at NoJitter, "breaking into an enterprise is as simple as downloading a free SIP soft client from the Apple Store, learning a company's external SIP address, and guessing at passwords." This article will unpack and illustrate these steps.

Content type: Blog Post

Links:

Avalanche Crime Syndicate Shut Down

Remember the Hollywood Presbyterian Hospital? on of the first in the wave of healthcare ransomware victims in 2016, it was forced to pay $17,000 in bitcoin before its records could be unlocked. Fortunately, however, a rare measure of justice has been achieved—the hospital's attackers have just been shut down, resulting in dozens of arrests.

Content type: Blog Post

Links:

KillDisk Malware Gets Ransomware Upgrade

KillDisk has long been a scourge of the world's enterprises. Infamously, it's been used to brick computer systems following actions on objectives, allowing malware authors to hide their tracks. With an added ransomware capability, this malware can prevent admins from reversing encryption by restoring backups.

Content type: Blog Post

Links:

DNC Hack Now Linked to Russian Army Malware

As if we didn't need more evidence that elements of the Russian intelligence services hacked the DNC, another link has emerged. Fancy Bear, malware linked to the DNC hack, has now been found in infected devices in the Ukrainian army.

Content type: Blog Post

Links:

Mobile Malware Linked to Hacks in Both DC and Ukraine

While lawmakers grapple with the implication that Russian hackers tried to tip the scales during the 2016 election, a new link has emerged. Malware known as "Fancy Bear" has been found on phones of both DNC staffers and Ukrainian Army units, showing a clear connection to Russian intelligence services.

Content type: Blog Post

Links:

Things You Didn't Know about Android Things

Android has recently come out with a new API for managing IoT devices, Android Things, which contains some interesting features for the administrator. This article will explain these features as well as the ways this might change an IoT strategy

Content type: Blog Post

Links:

Why is Kiosk Mode Important to MDM?

It might be useful for some of your readers to unpack basic MDM definitions (depending on your buyer type). This article will run down Kiosk mode and explain why this is useful for retail workers, remote-employees, customer-facing applications, etc.

Content type: Blog Post

Links:

AlphaGo Revealed as Mystery Game Master in China

The highest-ranking Go players across China have been bested in sixyt out of sixty games by a mysterious figure known only as "The Master". Recently, the identity of that master has been revealed—as an updated version of the Google AI, AlphaGo. This is yet another hallmark of the coming AI ero, in which machine learning platforms will perform ever more impressive feats.

Content type: Blog Post

Links:

SMBs Can Leverage Data Analytics to Beat the Market

Research suggests that SMBs can actually accrue more benefits from data analytics than their larger cousins—but most SMBs fall victim to the silo problem. In short, while SMBs can benefit from capturing and analyzing data, many lack the tools to make use of it. Those that do succeed, however, show improvements in customer retention and time to market. How do SMBs navigate the in-between space from disorganized data to successful analytics?

Content type: Blog Post

Links:

In 2017, Cut Costs With Project Management

The 2016 PMI Pulse of the Profession report stated that "Organizations waste US$122 million for every US$1 billion invested due to poor project performance." That's an increase over 2015—so for 2017, let's aim to take that figure down a notch. Based on the 2016 PMI Report, here are a few ways businesses can use project management to trim the fat.

Content type: Blog Post

Links:

To Emulate Technology Best Practices, Look at Yahoo—and do the Opposite

The Verizon-Yahoo acquisition is under threat. The deal that was once seen as the last hope for Yahoo's shareholders is now being overshadowed by two of the largest security breaches in history. From technology to disclosures, Yahoo's response to the hack was a sequence of wrong moves. Here's how companies can look at these mistakes, and learn.

Content type: Blog Post

Links:

Popular Database Becomes Ransomware Magnet

If you run MongoDB, check your backups, batten down the hatches, and prepare for trouble. At least twelve hacking groups, as of this writing, have been deliberately hunting down database implementations with unsecured connections. Upon discovery, they've been encrypting them and holding them for ransom. If your data is dear to you, here are three steps you need to take immediately to make yourself safe.

Content type: Blog Post

Links:

How Will eDiscovery Change in 2017?

Back at the end of 2015, the FRCP underwent a few tweaks. These new rules have had a subtle but pronounced impact on procedure in 2016, and the results of these changes will continue to redound into the new year. Changes in proportionality, dispute resolution, and other amendments are all things that lawyers must consider as they pursue cases in 2017.

Content type: Blog Post

Links:

Can Cybersecurity Affect M&A?

Consider Verizon and Yahoo. Once the last hope for Yahoo shareholders, the acquisition by Verizon is now perilously on the rocks. Yahoo's failure to disclose not one, but two massive data breaches puts its viability in question. This is far from the only case where information security has affected a merger or acquisition—let's look at a few examples.

Content type: Blog Post

Links:

How to Find a Marketing Agency that Adds Value

Small businesses can't afford to waste time throwing good marketing dollars after bad. While no agency can guarantee a specific ROI, there are a number of signposts that indicate when an agency will be a good fit. Here are a few factors that should stand out when you're choosing an agency to work with.

Content type: Article

Links:

Professional Service: On-Demand Technical Support

A sales document which elaborate the price, process, and limitations on ODTS for non-entitled EWN products.

Content type: Article

Links:

It's 2017--Time to Adopt Data Driven Marketing

Your clients are hungry. Instead of iterating on old techniques, it's time to show your work—how can you prove that your strategies are working, and refine those that aren't? This article will show agencies can use smart customer surveys and intelligent content to create work that's measurably more effective than the competition.

Content type: Article

Links:

Shameless Self-Promotion

One of the pitfalls of being a marketing agency is that it's difficult to eat your own dog food. In other words, the techniques that you use to attract your customers are going to be different from the techniques that you use to advertise your customers. This article will discuss a few eye-catching messages that marketing agencies use to grow themselves and earn new business.

Content type: Article

Links:

Data Driven Content Ideas

These days, almost every facet of marketing involves analytics. One glaring exception to this is the content ideation process. Despite all the data available to marketers, they still tend to select content topics based on whims and educated guesses. This post would higlight the importance of data-driven content ideation, with subtle references back to the Oz Content platform.

Content type: Blog Post

Links:

NSA Hackers Release Last Cache of Stolen Hacking Tools

Late last year, we mentioned how Russian hackers appear to have stolen working cyberweapons from the NSA. These hackers, known as "The Shadow Brokers," appear to have struck again, releasing a final cache of government-developed malware before disappearing. What does this trove hold, and what havoc will these tools wreak?

Content type: Blog Post

Links:

Malware Melts Down MongoDB Implementations

Hackers recently got wise to a vulnerability in MongoDB, a popular database platform, which allowed unauthorized users to view and change databases. Not only did bad actors swiftly catch wind of this security flaw, so many hackers tried to install ransomware that many of these databases got encrypted twice over. How did this happen, and how can users protect themselves?

Content type: Blog Post

Links:

World's Most Popular Password Hasn't Changed in the Last 3 Years

Spoiler alert: It's still "123456." I'm going to use the blog to talk about how these annual lists of bad passwords get developed, how quickly these passwords can be hacked, and how even niche communities are falling victim to attacks that target commonly-used words and phrases.

Content type: Blog Post

Links:

Suspected WhatsApp Vulnerability Could Let Operators Read Private Messages

Over the weekend, the internet erupted in furor as security researchers alleged that the owners of the popular messaging tool WhatsApp built a backdoor into the application, allowing them to read private messages. While this allegation is disputed, it turns out that there is a vulnerability which could allow attackers to conduct MITM attacks. This illustrates the importance of security, privacy, and granular encryption settings in UC applications.

Content type: Blog Post

Links:

Telecoms Take Action to Cut Out Phone Spam

Junk calls are supposed to be a thing of the past, but sales calls, often accompanied by robots masquerading as sales people, persist nonetheless. Here's how one telecom is using traffic analysis, voice recognition, and other big data tools to lock down spam calls on its network.

Content type: Blog Post

Links:

In the contact center revolution, what gets left behind?

The digital transformation is affecting all aspects of telephony, including contact center sales. Contact centers, however, might be getting the short end of it: These transitions are cost-intensive and time consuming. When consumers get stuck with large bills for features they might not need, the reputation of the industry suffers. What are best practices in the industry transition of contact center VoIP?

Content type: Blog Post

Links:

WP Edit: SD WAN

Edits for the SD WAN wp. These took about 4.5 hours.

Content type: Whitepaper

Links:

When You Travel, Your Data Travels Too: How to Avoid Getting Hacked on the Go

For the well-heeled traveler, flying is a comfort. Your seat folds into a bed, your meal is prepared by five-star chefs, and you email is hacked via the in-flight WiFi. Wait, what was that last one? It turns out that when you travel, your data is much more vulnerable. In-flight WiFi is just one example—hotels, airport lounges, and even cars have vulnerabilities that can allow hackers to glean valuable data while you're in motion.

Content type: Blog Post

Links:

It's 2017--Time to Adopt Data Driven Marketing

Your clients are hungry. Instead of iterating on old techniques, it's time to show your work—how can you prove that your strategies are working, and refine those that aren't? This article will show agencies can use smart customer surveys and intelligent content to create work that's measurably more effective than the competition.

Content type: Blog Post

Links:

Shameless Self-Promotion

One of the pitfalls of being a marketing agency is that it's difficult to eat your own dog food. In other words, the techniques that you use to attract your customers are going to be different from the techniques that you use to advertise your customers. This article will discuss a few eye-catching messages that marketing agencies use to grow themselves and earn new business.

Content type: Blog Post

Links:

What 15 Great Sports Coaches Can Teach You About Building a Content Community

Lessons from Bill Belichick, Bill Walsh, John Wooden, Pete Carroll and other coaching greats on how to build and manage a community.

Content type: Blog Post

Links:

Why you shouldn't wait for law enforcement to protect you

The FBI apparently knew about the DNC hacks for nearly a year before informing the campaign.

Content type: Blog Post

Links:

IBM warns of rising VoIP cyber-attacks

SIP attacks are trending sharply upwards, targeted to cause equipment failures and call fraud.

Content type: Blog Post

Links:

Blocking 911 With DDoS Attacks

The other week, we talked about e911 for VoIP phones. We've also talked a bit about how it's possible to essentially DDoS VoIP phones via a SIP attack. This lends itself to a disturbing intersection—it's possible to DDoS VoIP phones so they can't call emergency services.

Content type: Blog Post

Links:

Yealink/Edgewater

A solution brief regarding how YeaLink video conferencing services can work together with EdgeProtect Intelligent Edge Solutions

Content type: Article

Links:

Out of Many, Sun: What You Should Know About Group Solar Buying

Group solar buying allows businesses to multiply the power of their dollars. By joining together with homeowners, developers, and municipalities interested in this low-cost form of energy, businesses can avail themselves of bulk discounts from manufacturers and tax breaks from state and federal governments. This article will talk about ways to organize group solar purchases, the discounts available, and some organizations which are already boosting group solar (see reference link).

Content type: Blog Post

Links:

Why Now is the Right Time to Start Thinking About Solar

The price of solar panels will continue to be cost-competitive with fossil fuels, even after federal subsidies are taken away. Better still, the price per until of lithium batteries is dropping off a cliff. Every time the global capacity of lithium storage doubles, the price drops by 22%. Since there's typically a lot of lead time with commercial solar projects, this means that by the time a project planned today is realized, businesses will be able to enjoy an unprecedented cost-benefit ratio.

Content type: Blog Post

Links:

Dreaming of Electric Sheep: How Farms Benefit by Going Solar

The same places that benefit from growing crops can also benefit from going solar. It stands to reason—crops need lots of sunny days to grow, and solar panels work the same way. Commercial solar can be a cash crop for farms—agricultural solar leases can pay around $800 per acre, in a time where $500 per acre is considered a good yield. Plus, solar doesn't require complex harvesting equipment, intense manual labor, or water.

Content type: Blog Post

Links:

Why a C-Level Executive Needs Skype for Business

Implementing Unified Communications (UC), used to be a lengthy process, which involved ripping out old phones and infrastructure, rehiring and retraining personnel, and completing a lengthy turn-up process. The cloud has made this process easier—but not foolproof. Enter Skype for Business, which not only provides a unified platform for VoIP, chat, and video, but can also hook seamlessly into an enterprise's pre-existing infrastructure via the Skype Operations Framework.

Content type: Whitepaper

Links:

Do you Need a CISSP to Become a Cyber Security Expert?

We've previously talked about how how information security is currently going through an employment crisis. Now, let's talk about how to make up that gap. Becoming a cyber security expert means becoming qualified for an exciting, high-paying job at the forefront of the national conversation. Here's now to get started

Content type: Blog Post

Links:

Many Hands: The Creators of Cyber Security and Their Legacy

One could argue that the history of cybersecurity began with the first antivirus program—but that's an oversimplification. The truth is a lot stranger, and it involves interesting characters like science fiction authors, Soviet spys, overworked systems administrators, and more. Here's a look at some of the foundational figures in cybersecurity.

Content type: Blog Post

Links:

So, What's a Firewall, and Why is it Important to Network Security?

Becoming an information security expert means learning some definitions. If you're new to the blog, or new to the concept of information security in general, you might find yourself scratching your head when we drop this term.Unpacking the definition of a firewall is actually quite tricky. Is it a dedicated network security appliance? A software program that bundles in an AV package? How's it different from an IDS/IPS? This article will look at those questions and more.

Content type: Blog Post

Links:

What Is Cyber Security?

Let's take it from the top. SentinelOne talks a great deal about malware and endpoint protection, but these aren't the be-all and end-all of infosec. Malware prevention is part of a holistic framework known as cyber-security. This article will explain what that is, and how endpoint protection fits in.

Content type: Blog Post

Links:

Best Practices for Securely Consolidating Data Centers

Data center consolidation could take the form of any of these: merging with another organization, getting rid of obsolete hardware, or booting it all into the cloud. No matter what your reason is, there's an important consideration that many organizations overlook: security. Do it wrong, and you could find that all of your most important databases are searchable on the open internet via Google. Here's how to do it right.

Content type: Blog Post

Links:

Top (N) Replacements for Traditional Antivirus

The antivirus you're using right now might be dead. That was the pronouncement of a top Symantec official back in 2012—and since then, the problems with traditional AV have only gotten worse. There's no way for security researchers to write enough signatures to keep up with the tremendous flood of new viruses that come out every day. Let's look at a few replacements—EDR, NGAV, and others—in order to see how to bring your security back to life.

Content type: Blog Post

Links:

(N) Ways that Ransomware Has Gone Beyond Hospitals

If you've been skimming the news lately, you might think that ransomware has mostly confined its targets to healthcare organizations. While this is true in a broad sense—they're far and away the most likely targets—there's been troubling surges in other areas. The San Francisco Muni, the Washington DC police surveillance cameras, and a hotel (which was forced to lock out its guests until the ransom was paid) are all recent victims that don't fit the mold.

Content type: Blog Post

Links:

How a Poker-Playing AI Will Revolutionize Sales

Here's an idea: You're trying to assess a customer. She's making buying signs, but the process is starting to drag on. Are you seriously in contention, or about to get dragged into a meaningless bidding war? You might not know—but soon, a revolutionary computer program could help you out. An AI known as Libratus just successfully beat four professional poker players to the tune of $1.7 million in virtual chips. The same algorithms might tell you if your leads are serious—or simply bluffing.

Content type: Blog Post

Links:

Artificial Intelligence Pros and Cons — Plus What to Expect from 2017

Artificial Intelligence has proven to be a tremendous resource for information security. As the users of AI-based endpoint protection have begun to prosper, cyber criminals will inevitably prepare countermeasures. Here are a few advantages and drawbacks of AI—and how attackers may start to use AI against us.

Content type: Blog Post

Links:

How Does SSL Work, and Why is it Essential for Infosec?

SSL is complicated, finnicky, and absolutely vital. This protocol creates an encrypted channel between you and the websites you're browsing, preventing attackers from snooping on your traffic. It's not foolproof, but it still represents one of the foundational security measures for browsing the web.

Content type: Blog Post

Links:

How to Protect Yourself from Zero Day Malware

Zero days represent, as Donald Rumsfeld once put it, "unknown unknowns" within the field of cyberwarfare. You don't know what bugs might be lurking in your mission-critical software, and therefore it's hard to evolve a defensive strategy. Nonetheless, there are ways. Here are a few:

Content type: Blog Post

Links:

Speakers We're Looking Forward to at RSA 2017

With panelists including Whitfield Diffie , Susan Landau, Michael Assante, and more, RSA 2017 features a packed slate of experts. Here are (x) panelists that we think are the cream of the crop, plus their bios and subject matter.

Content type: Blog Post

Links:

RSA 2017 Participants will Discuss a New Cybersecurity Paradigm

There's an emerging standoff, in the information security world, between machine-learning proponents, and those who favor defense in depth. As RSA 2017 comes together, the advocates for these two philosophies will inevitably clash. Can AI stand on its own, or should it become just another bulwark in the defense-in-depth strategy?

Content type: Blog Post

Links:

EWN Webinar Blog

Summarizing and promoting the New Frontier for UC Deliver Webinar

Content type: Blog Post

Links:

Down on the Robot Farm: Exploring Robots in Agriculture

You don't know it, but there's a good chance that some of the food you ate today was grown by a robot. Don't worry—this shouldn't affect the flavor. In some ways, robots are a perfect fit for the field. Drones can monitor the state of the harvest from above, and unmanned GPS guided tractors can till the fields below. Let's learn how the agricultural ecosystem is about to go robot.

Content type: Blog Post

Links:

The Future of Robots in Renewable Energy

The cost of solar power is plummeting, and wind isn't far behind. With installations of both wind and solar booming, an unexpected newcomer is booming with them—robots! With wind turbines soaring hundreds of feet in the air, and solar farms often buried deep in the desert, it can often be hazardous to get human workers out there. Drones of every description are starting to pick up inspection tasks at these hard-to-reach power plants.

Content type: Blog Post

Links:

How Does Skype for Business Beat TDM?

I'd like to write an ebook aiming at some of the feature benefits of SfB. I feel like many business leaders are probably happy with the phones they have as long as they hear a dial tone when they pick it up. For that reason, SfB could be a tough sell. Let's push back on that with a high-level feature comparison that clarifies how UC can save time and money for the enterprise.

Content type: Whitepaper

Links:

When it Comes to the Question, "What is a CISO?" Different Companies Have Different Answers

The position of CISO--Chief Information Security Officer--is one of the newest roles ever created in the field of information security. As such, there's no standard definition of the CISO's roles and responsibilities. Does the CISO report to the board with the other C-level executives? Do they have their own budget, or do they share it with the CIO? Here are a few ways that CISOs can operate within the enterprise.

Content type: Blog Post

Links:

What Are the Most Dangerous Insider Threats in Cyber Security

When you think of insider threats in cyber security, it's hard to escape the idea of characters like Chelsea Manning, Edward Snowden, and most recently, Harold Martin. These are high profile cases—but they are far from the most dangerous insider threats threats in cyber security. Here's what to look for in an insider threat—and why the most dangerous threats are the ones that get away.

Content type: Blog Post

Links:

The Best High School Robotics Competitions

We've talked about competition and robotics, and we've talked about robots in education—but what about high school robots competitions? Every week, dozens of high schools around the country compete to guild the best robots, solving obstacle courses, manipulation challenges, and more. Forget soccer, baseball, or football—robots are the coolest new high school sport.

Content type: Blog Post

Links:

Next-Gen CRM must focus on Engagement

The cost to acquire a new customer is rising. Armed with information, customers are now wary and skeptical of sales promises. CRM's are still great for new business—but they must begin to add new capabilities. This includes data collection and analysis from across every business unit and across the entire customer relationship. Research shows that companies who achieve these new expectations also achieve an 88% customer retention rate.

Content type: Blog Post

Links:

Don't stockpile Bitcoin—Invest in Working Antivirus (Solutions Review)

When it comes to protecting their critical systems, companies can often adopt idiosyncratic behavior. For example, some companies are now stockpiling Bitcoin (whose price has recently exceeded that of gold) in order to be able to instantly pay off ransoms in the case of a malware infection. Not only does this fail to help companies avoid ransomware attacks—it may ultimately make corporate funds less safe.

Content type: Article

Links:

AtomBombing Malware Now Found in the Wild (Information Security Buzz)

We recently wrote about AtomBombing—it's a type of code injection attack that targets atom tables in Windows applications. It's unpatchable, and can currently only be stopped by monitoring API calls. This technique is now in the wild, showing up in the infamous Dridex banking Trojan. New malware techniques have always been a destabilizing force in information security. How much should we worry?

Content type: Article

Links:

Information Security Breaches Finally Affect the CEO (Solutions Review)

CISOs have a rough go of it. As recently as 2015, half of all C-Levels saw CISOs as a an expendable stalking horse to fire in the event of a breach. Information security policy is set from the top down, however. With Yahoo's CEO Marissa Meyer finding herself penalized in the wake of the search company's massive breach, is this the year that CEO's get held accountable?

Content type: Article

Links:

S3 Outage Exposes More IoT Risks (ISbuzz)

We often talk about the risks that surround the unsecured Internet of Things. The Amazon S3 outage exposed the dangers that occur when IoT devices lose their connections to the backend. Ordinary consumers lost the ability to control their ovens, alarm systems, and lights. There are definitely ways that attackers could use these failures to hijack the enterprise.

Content type: Blog Post

Links:

CommCore Case Study

Based on brain dump from week of 2/27

Content type: Article

Links:

Rumus QA

Per brain dump, week of 2/27

Content type: Article

Links:

Data Driven Pharmaceuticals

Per brain dump on 3/3/2016

Content type: Blog Post

Links:

Giving Jibo a Voice

Jibo has a personality that's thoroughly conveyed through our detailed style guide. Making him react a certain way to certain inputs is just one part of what makes Jibo special, however. What goes in to programming Jibo's tone of voice, and ensuring that he pronounces words correctly?

Content type: Blog Post

Links:

Data Driven Pharmaceuticals

Per brain dump

Content type: Blog Post

Links:

Skincare blog

Based on brain dump 3/13/2017

Content type: Blog Post

Links:

The top (x) KPIs a Marketing Agency Must Track

In our last guest post, we mentioned the importance of revenue attribution in order to determine the success of a marketing agency. As it happens, this is just one of a number of important factors that marketing agencies need to track in order to measure their performance. Others include: Cost per lead; Customer value;Traffic to lead ratio; And more! Let's learn what makes these important, and how to keep score.

Content type: Article

Links:

What to Look for in DRaaS

Looking for: Integrated backup and DRaaS (they're not the same thing) High uptime Rapid failover

Content type: Blog Post

Links:

Marketing Automation eBook

Based on brain dump call for 3/22/2017

Content type: Whitepaper

Links:

Google Unveils Anthos

Google recently unveiled a new hybrid cloud platform, powered by kubernetes, that will help companies escalate their move off-premise.

Content type: Blog Post

Links:

Promo blog for Backbone to CDN WP

Promo blog for Backbone to CDN

Content type: Blog Post

Links:

The Major CSP Stumbling Blocks (That Network Edge Orchestration can Fix)

CSPs face challenges such as (1) Insufficient visibility into customer sites (2) Security and vulnerability risks (3) Lack of remote management and diagnostics (3) Service Assurance from customer premises through the CSP network (3)Enabling the mass market adoption of services across countless customer locations. This blog will quickly run down these challenges and explain how they're fixed with NEO.

Content type: Blog Post

Links:

How CSPs can Capture the SMB Market

The 2008 economic recession essentially cancelled the idea that SMBs would ever adopt on-premise UC hardware. CSPs have another bite at the apple with the advent of hosted UC, but they have a large competitor in the form of established telecoms. How can CSPs out-compete the communications giants?

Content type: Blog Post

Links:

What Does a Network Edge Orchestration Platform Need?

Recap Frost and Sullivan conclusion: a NEO platform needs a cloud dashboard, premise-based intelligent edge, ecosystem integration, consolidation of services, actionable intelligence etc.

Content type: Blog Post

Links:

Measuring the Cost of Downtime from Ransomware

Downtime costs money. The cost of an hour of data center outage is has spiraled upwards every year. Now, imagine that your entire business is down for a week. That's what ransomware does to one in ten businesses it affects.

Content type: Blog Post

Links:

Avoiding Common eDiscovery Pitfalls

(1) Failing to account for new data storage technology (2) Litigation holds are too narrowly applied (3) Collecting too much data without organizing or consolidating it. (4) Poor data preservation

Content type: Blog Post

Links:

Issues with Insourcing eDiscovery

Issues: (1) Labor - does an eDiscovery workload match your team's available bandwidth? (2) Process - eDiscovery relies on knowledge, not tools. Do you have a mature process in place that won't miss evidence? (3) Scalabiliy & Cost - if you're a legal department within a company, will building eDiscovery cause your department to become too big to support?

Content type: Whitepaper

Links:

New Phishing Attack Takes Advantage of Unicode

A new attack strategy lets malicious URLs exactly mimic those of legitimate websites, right down to the secure HTTPS logo—using the same code that generates emojis.

Content type: Blog Post

Links:

Rumus QA Promo Blog

Based off of Rumus QA solution brief with Rosa's edits.

Content type: Blog Post

Links:

Introduction to Microservices

I'd like to do a brief blog on how microservices are changing application development. I'm not sure of the exact VirtualMind position of microservices (though I suspect you're in favor), but I'm able to provide a nuanced, reasoned understanding of what microservices are for, who should be using them, how to get started, and so on.

Content type: Blog Post

Links:

Giving Jibo a Voice, Part 2

Talking more about the development of the Jibo TTS system.

Content type: Blog Post

Links:

Penetration Testing Definition Page

Per kick-off class on 5/17

Content type: Blog Post

Links:

Google Unveils AI as a Service

At its recent I/O conference, Google announced a surprise. The chips powering its legendary Deep Mind software are about to become available to third parties as a cloud service. Now, application developers and analytics companies will be able to harness the power of Google to refine and improve their machine learning software on a turnkey basis.

Content type: Blog Post

Links:

Did WannaCry Fail Due to Better Backups?

WannaCry may have been one of the world's deadliest ransomware attacks, but it collected a pitiful amount of money compared to the number of people it infected. Is this a sign that enterprises are getting better at backing up and restoring encrpyted files?

Content type: Blog Post

Links:

(x) Reasons Why an Influencer Relationship Should Be a Strategic Partnership

Influencer marketing needn't be a one-and-done deal. Marketing agencies and companies can experience a massive lift from long-term relationships with influencers that fit their particular niche. Here are a few examples of how companies have benefited from partnerships with influencers ranging from authors to IT directors.

Content type: Blog Post

Links:

Webinar Demo Blog

I think it might be nice to combine screenshots from the SpringML webinar and descriptions from the demo into a short text package that details how to use the platform. A lot of people aren't going to have the time to watch a webinar, and might not schedule a demo on their own. A shorter text description may be more appetizing, and I could point the CTA towards another piece of gated content.

Content type: Blog Post

Links:

Will ransomware begin to target more robust backups?

Windows has an automated backup protocol, the Volume Shadow Copy, which hackers definitely know about. Most serious ransomware variants are designed to seek and delete those copies, but enterprises usually invest in more serious forms of DR. As ransomware users continue to pursue lucrative targets, will they refine their malware to attack dedicated disaster recovery services?

Content type: Blog Post

Links:

How agencies can grow through strategic partnerships

Marketing agencies can sometimes risk falling into the trap of being called upon merely to execute a strategy, as opposed to demonstrating leadership. This isn't a path to growth. By creating deep partnerships with companies and influencers, marketing agencies can grow alongside them and achieve astonishing success. Examples include becoming a channel partner for a fledgling company, creating a strategic board or advisors, or finding industry-related partnerships with non-competitors.

Content type: Article

Links:

NSA exploits are still being released in the wake of WannaCry

The massive ransomware attack on May 12th brought companies worldwide to a standstill—and the hackers that powered that ransomware are still at it. WannaCry was based on an exploit stolen from the NSA by group known as the Shadow Brokers. These hackers have been leaking information from the NSA since August, and a recent dump shows that they aren't done releasing potentially damaging and dangerous information.

Content type: Blog Post

Links:

Hackers aren't just attacking businesses—there's a hidden cyber civil war

There's no honor among thieves. Criminals robbing other criminals is one of the oldest tropes in law enforcement—so it's no surprise that gang wars proliferate on the Deep Web. Cybercriminals often attack one another in order to steal information, or even to mask their own cyber attacks.

Content type: Blog Post

Links:

SunPower Blog: How will fossil fuel companies adapt to a low-carbon world?

Coal companies are turning their tapped-out mines into solar farms. Exxon's investors are pushing the company to report on sustainability initiatives. All over, big fossil fuel producers are trying to prepare for the demise of the carbon bubble. Here's how solar will come to their rescue.

Content type: Blog Post

Links:

How to give robots a sense of touch

3d printing and microelectronics are about to combine to give robots a whole new dimension of sense. Touch has always been a problem in robot design, with this mostly confined to the realm of bulky pressure sensors. New 3d-printed electronic "skin" can add refinement to these sensors. This is critical for applications ranging from medicine, to manufacturing, and even to smart tattoos.

Content type: Blog Post

Links:

No honor among thieves—hackers attack each other on the deep web

Hackers often attack each other for a variety of reasons. It may be to steal data, pilfer hoarded zero days, or even mask the origins of an attack. Regardless of the reason, these attacks may be a boon for security researchers. They can use hackers attacks on each other in order to form a better model of criminal behavior, and then use this data to turn around and protect the enterprise.

Content type: Article

Links:

TTL Glossary Entry

Per brain dump call on 6/7

Content type: Blog Post

Links:

How Hubspot Can Bridge the Sales/Marketing Divide

The disconnect between sales and marketing is well documented, especially within B2B tech. Although HubSpot offers solutions for both groups (automation, CRM, etc.) this alone does not guarantee a productive relationship. This whitepaper would position Penguin Strategies as an expert in helping brands bridge this gap using the HubSpot platform.

Content type: Whitepaper

Links:

Tornado Siren Hack Exposes Telecom Vulnerability

Two months ago, an unidentified hacker using a free "software-defined radio" service set off deafening tornado warning alarms in Dallas. this attack used a technique similar to "phone phreaking" back in the 1970s—using tones played over radio to gain unauthorized access to a system. This attack exposes a widespread vulnerability in infrastructure that's controlled via telecom or radio signals.

Content type: Blog Post

Links:

What does it take to lead the SIP trunk rankings?

SIP trunk providers are the lynchpin of VoIP service, and there's been a recent sea change in how they're ranked. Incumbent providers are being swept aside by newcomers—what do these companies have that their predecessors did not?

Content type: Blog Post

Links:

HIPAA for VoIP

Essentially, I'm going to do a re-skin of the article linked in the sources, but with 2017's developments in mind.

Content type: Blog Post

Links:

What will software defined storage mean for enterprise backup?

Hyperconverged infrastructure adoption is surging among enterprises—and software-defined storage is tightly integrated within HCI. With storage no longer confined to rigidly-defined arrays, the process of backing up and recovering SDS data is going to change too.

Content type: Blog Post

Links:

Is 3DXpoint About to Change the Way Data is Stored?

Intel has recently commercialized its version of persistent memory—essentially a non-volatile form of RAM that lets enterprises process entire databases without streaming from the hard drive. Assuming that this technology catches on (a very big assumption), how will it change the nature of computing and storage?

Content type: Blog Post

Links:

New Ransomware Variants Targeting Apple Computers

Mac users tend to shrug of warnings of viruses targeting their systems, but a new ransomware threat is nothing to sneeze at. Not only is the new virus freely available for criminals on the darkweb, it also defrauds its victims. Affected users have their data permanently encrypted, meaning that even if they pay up, their data is still lost forever.

Content type: Blog Post

Links:

Fileless Malware Attacks a Bad Sign for the Security Landscape

Fileless malware, once a technology used mostly by state-sponsored actors, has filtered its way into the hands of common criminals. This has been fully proven by a wave of financially motivated attacks targeting restaurants across the US. Since this attack was invisible to all major AV platforms, only techniques that can guard against phishing attacks will be viable as a defense.

Content type: Blog Post

Links:

How will you protect data on Hybrid Clouds?

Hybrid cloud adoption is essentially the default for most organizations. Some data will go in public cloud storage, and the rest will be housed on on-premises assets. About 67% of companies do this, but what are the regulatory and compliance implications of storing data when you aren't sure if it's on infrastructure you own or not?

Content type: Blog Post

Links:

Will the GDPR Stifl Digital Innovation?

The approach of the GDPR has sparked worries among tech companies that they will be forced to slow down their digital innovation in order to meet an onerous compliance regime—but is this really the case? Here's why the GDPR will catalyze digital developemnt.

Content type: Blog Post

Links:

How Secure Data Exchange will Let Companies Comply with the GDPR

Highlight the SDE project in context of the GDPR.

Content type: Blog Post

Links:

Comply with the GDPR with Secure Data Access

Highlight Safe-T's Secure Data Access product in the context of the GDPR.

Content type: Blog Post

Links:

The GDPR Might Be Onerous—But It Could Have Been Worse

Companies may be moaning about how the EU's GDPR is forcing them to change their data protection regimes, but they don't know how good they have it. The EU's Information Commissioner has tabled some pretty interesting ideas over the last few years, including banning under-16s from social media, implementing a completely ineffective cookie law, and trying to ban encryption software. It could have been so much worse.

Content type: Blog Post

Links:

Do we have to hire a data protection officer? Understanding the DPO

Write about how companies may be required to create the role of a Data Protection Officer under the GDPR, and what exactly that entails.

Content type: Blog Post

Links:

CSPs Need a Better Marketing Message—Now!

The next two-to-five years are going to be an interesting time for IP communications. Over 90% of companies with over 20 employees are interested in installing VoIP, but most can't give a specific reason *why* they have interest. That's not an attitude that's conducive to making near term buying decisions, so CSPs need a better message, stat.

Content type: Blog Post

Links:

How can service providers penetrate the low end of the market?

Over 80% of US businesses have less than 20 employees. These companies represent the largest potential marketshare for new VoIP installations, but by their nature they're likely to spend very little on IT. What message will resonate with these smaller companies?

Content type: Blog Post

Links:

3 New Blogs

1) What is Malware? 2) What is an online scam? 3) what is a rootkit?

Content type: Blog Post

Links:

Tier 2-4 Service Providers: How David Beats Goliath

Based on 7/27 conference call

Content type: Blog Post

Links:

Why the Google Antitrust Ruling is an Ominous Sign for GDPR Enforcement

Under the current data protection laws in the EU, the largest fine ever assessed was 400,000 Euros for the TalkTalk breach. While the ruling against Google is based on antitrust laws, the language of the ruling suggests that under the GDPR, violators could receive similarly large penalties.

Content type: Blog Post

Links:

How do Cloud Services Comply with HIPAA?

Cloud storage is fast, convenient, and often cheap — but is it compliant? In some cases, it's not, and definitely not if you're using the free, non-enterprise versions of cloud storage apps. Here are the best ways to navigate the world of cloud storage and computing in a compliant manner.

Content type: Blog Post

Links:

Securely Deleting Data: On Hard Drives, SSDs, and in the Cloud

The best way to keep data secure is to destroy it. Sometimes, this means taking the media it's stored on and physically smashing it. Other times, it means following a number of DOD-related guidelines that let you delete data irretrievably while preserving its substrate. Which methods are best?

Content type: Blog Post

Links:

Security Concerns Still Slowing Cloud Adoption

While cloud adoption is still growing rapidly, there remains a determined base of companies who have rejected cloud adoption. These companies overwhelmingly worry that they lack the security expertise to master the additional challenges that cloud adoption might bring — and that adding these capabilities would be far too expensive. What's the best way to get reliable cloud security for a reasonable price?

Content type: Blog Post

Links:

Securely Deleting Data: On Hard Drives, SSDs, and in the Cloud

The best way to keep data secure is to destroy it. Sometimes, this means taking the media it's stored on and physically smashing it. Other times, it means following a number of DOD-related guidelines that let you delete data irretrievably while preserving its substrate. Which methods are best?

Content type: Blog Post

Links:

How misconfigured servers can sink your compliance initiatives

One month ago, a misconfigured server belonging to a third-party vendor exposed millions of Verizon customer records to anyone who had the web address of a particular server. This kind of data breach happens depressingly often — here's why these breaches occur, and what administrators can do to prevent them.

Content type: Blog Post

Links:

Hit by ransomware? Assume your data is never coming back

Paying a ransomware ransom is never a good idea, but with two major ransomware campaigns in recent months, it's a worse idea than ever. Both WannaCry and NotPetya contained bugs which prevented victims from decrypting their data — even if they paid up. To avoid ransomware, invest in backup and recovery, not decryption.

Content type: Blog Post

Links:

Downtime from ransomware does the most damage

98% of businesses say that downtime can cost them up to $100,000 per hour. Ransomware, meanwhile, can bring down computers for several hours, if not days. It's easy to see that the downtime that ransomware causes, and not the ransom itself, does the most economic damage. Here's how to fix it.

Content type: Blog Post

Links:

Why 5G mmWave Broadband is Ready for Deployment

Per abstract sent by Zohar.

Content type: Blog Post

Links:

What will Software Defined Networking mean for compliance?

Hyperconverged infrastructure adoption is surging among enterprises—and software-defined networking is tightly integrated within HCI. With networking no longer confined to rigidly-defined switches, are the best practices for securing data about to change?

Content type: Blog Post

Links:

Understanding the cloud controls matrix working group

"The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider." Unpack these guidelines and learn how to apply them to your next cloud deployment.

Content type: Blog Post

Links:

Will Platform Consolidation Dismantle Your Security Solutions?

There's been an explosion of new security solutions in the wake of emerging variant cyber threats, and there's one sure thing that follows an explosion -- consolidation. Choosing the wrong solution may mean that your security products become part of competing ecosystems — here's how to choose right.

Content type: Blog Post

Links:

VoIP Robocalls can Hobble Businesses

Imagine that you're trying to conduct business on the phone. All of a sudden, your phone starts to be inundated by robocalls. You can't make any outgoing phone calls, and you can't tell incoming junk calls from legitimate calls. What are you going to do? Here's how VoIP calls are turning into a new form of DDoS attack.

Content type: Blog Post

Links:

Can your VoIP Network Survive a Hurricane?

With Hurricane Harvey just passed, and Hurricane Irma potentially on its way, it's time to ask yourself what will happen to your communications network during a natural disaster. Whether you're a massive CSP or a local operator, here are some of the preparations you can take to resist the worst that Nature has to offer.

Content type: Blog Post

Links:

Voice Over AI: The Future of Artificial Intelligence and Unified Communications

Artificial intelligence and VoIP seem like disparate inventions, but they're steadily colliding together. Voice recognition is more or less enabled by VoIP connections carrying human voice recordings to unimaginably vast cloud based computers. How might this grow to impact service providers in the future?

Content type: Blog Post

Links:

3 Reasons Why Print Security Will Haunt You if You Ignore It

right off the top of your head, do you know how you're securing your printers? Most IT administrators have no idea, and that's bad news for security. Your company's most important documents regularly pass through its most insecure machines. Printers have been hacked in every way imaginable -- including by drones -- and these devices are just waiting for a major cyberattack to happen.

Content type: Blog Post

Links:

Robots for Hurricane Relief!

Hurricane Harvey has come and gone, but robots are here to help us sort through the aftermath. Commercial drone operators are out scouring the countryside, aiding in rescue efforts. Here are a few current and future robots that might assist us through the next big natural disaster.

Content type: Blog Post

Links:

Measuring the ROI of Marketing Automation

A recent study has found that while 82% of marketers believe that marketing automation brings efficiency and ROI, only 53% of companies have implemented it so far. One of the reasons is that while everyone agrees that MA delivers ROI, people don't really know how to measure this. We'll explore methods, such as revenue attribution, which might make this easier.

Content type: Blog Post

Links:

Light Fines for Lenovo, Caught Selling Pre-Installed Malware

The FTC gave Lenovo what amounts to a slap on the wrist for selling computers with pre-installed malware. In other words, if your computer provider wants to snoop on you, there's very small penalties for doing so. This liability poses both security and compliance issues -- here's how Safe-T can help.

Content type: Blog Post

Links:

What Does the Anti-Monopoly Case Against Google Mean for Compliance?

Google isn't just a single company anymore -- it's a cluster of companies, each sharing data with every other. Critics say that this undermines the open market — and they're starting to get the upper hand. Is there a way for large companies to operate in the market and share data without stamping out others' ability to compete? Let's design a hypothetical compliance solution that might make this work.

Content type: Blog Post

Links:

Tabbed Content: Yes or No?

Tabbed content -- content that is on the same page but hidden by a "read more" button -- is now officially OK to use, according to Google. With that said, it might still be hurting your page ranking if done incorrectly. Here's how to do it right, preserving the look of your site without hurting your rank.

Content type: Blog Post

Links:

3 Reasons why the "Pivot to Video" is Destined to Fail

Marketers and digital publishers have been frantically laying off their traditional editorial staff in order to make way for a "pivot to video." This is positioned as some sort of magical revolution that will bring in eyeballs and revenue -- but the video-chasers are doomed to failure. Every metric suggests that offloading valuable resources in order to onboard video content is a bad idea. Here's why.

Content type: Blog Post

Links:

Pivoting to Video? Get Ready to Pay for a CDN

Pivoting to video is all the rage for marketers and publishers, but it comes at a high cost. Latency and page load times skyrocket on video-heavy pages, and if you remember the statistics about page load times and viewership, a great deal of visitors might now be expected to bounce. Here's how to mitigate those effects.

Content type: Blog Post

Links:

Do you allow cloud access? Your next leak is around the corner

In order to protect enterprises from data leakage, administrators need to implement policies that are both rigorous and yet easy to follow.

Content type: Blog Post

Links:

Is Your New Digital Service Secure?

If you're part of a managed services company, digital products are your bread and butter. On the other hand, if the product you're selling is insecure, you're going to drive away a whole lot of business.

Content type: Blog Post

Links:

Mitigating Fileless Malware: What You Need to Know

Up to 20% of malware now employs some form of fileless persistence, C2, or exfiltration method — and very few antivirus programs are able to catch it. Until the state of the art catches up, companies should assume that they will be targeted, and perhaps compromised. That doesn't mean your data is up for grabs, however. Companies can prevent their data from being siphoned off, even in the event of penetration by fileless malware--here's how.

Content type: Whitepaper

Links:

Equifax Breach Shows How Not to Respond to a Cyberattack

Breach notifications six weeks late. Confusing instructions on the internet. An extremely unpopular (and possibly illegal) arbitration clause. With lawsuits already starting to fly, Equifax's breach response may go down in history as one of the worst on record. Here are a few reasons why Equifax did exactly what you're not supposed to do, and how you can do better if the worst should come to pass.

Content type: Whitepaper

Links:

Unstructured Structure: Why Most Data Isn't in Databases

About 80% of business data is unstructured. No relational database, no neat tables and columns, just the digital detritus of human-generated information. Thing is, this data isn't just voluminous--it's important. The day to day operations of a business might depend on the ability to categorize and protect this information. Here's why unstructured data is so important.

Content type: Whitepaper

Links:

Equifax Response

Per email brief

Content type: Blog Post

Links:

Do you trust your employees discretion?

People are not generally good at following security practices on their own. Reams of research have confirmed this--so why do you still trust your employees to follow compliance regimes?

Content type: Blog Post

Links:

In PGP Blunder, Adobe Security Team Releases Private Key

Rule number one of PGP security is this: never release your private key. Ever. Unfortunately, that's exactly what the Adobe security team just went ahead and did, a move that would potentially allow bad actors to intercept their private communications. Once we're all done laughing at them, let's also remind ourselves that PGP is, among other things, very difficult to work with. Is it time for a new encryption system?

Content type: Blog Post

Links:

Deloitte Breach Dated Back to Fall of 2016

Despite attempts to downplay the extent of a recent breach, it appears that the Deloitte hack was larger than previously reported. Hackers had free reign within the network, compromising the entire email database and all administrative accounts, and exfiltrating several gigabytes of data to a UK server. This is a hack that Safe-T, which applies commonsense network segmentation and controls all flows of data into and out of the perimeter, could certainly have prevented.

Content type: Blog Post

Links:

Popular System Optimization Service Hacked

CCleaner, a free program designed to speed up user's computers, has recently been in fact slowing them down by serving updates laced with malware. The attackers appear to have infiltrated the update servers that distributed version 5.33 of the application, and were using data from the malicious update for industrial espionage. Since the CCleaner program already had root-level access to user's systems, attackers were able to take advantage of the fact that updates weren't scanned by antivirus.

Content type: Blog Post

Links:

Nearly 10% of AWS Servers are Insecure

Misconfigured Amazon S3 servers are leaking data left and right.7% of all AWS servers have been accidentally left to "public," meaning that anyone with the URL can find and access their contents. Since this has been made easier with the release of automated discovery tools, no public AWS server is safe.

Content type: Blog Post

Links:

Yesterday's Technology, Today: The US Smartphone Secondary Market

Remanufactured and certified pre-owned smartphones provide concrete benefits. They're almost every bit as good as a comparable brand-new phone, and purchasing these phones provides a substantial environmental benefit, conserving limited resources and keeping e-waste out of landfills. Still, there's considerable resistance to buying refurbished smartphones among consumers. How can resellers optimize the their lifecycle in order to maximize their revenue from CPO devices?

Content type: Blog Post

Links:

Skype Teams White Paper

Hi guys! It's been awhile since I've written to you, but I noticed that MS was now putting SfB on the back burner and promoting Skype Teams. Since this affects your business, I thought you might like to put out some collateral about business collaboration. What do you think?

Content type: Whitepaper

Links:

For Better Support, Ditch Physical SD-WAN appliances

SD-WAN appliances are convenient, but some of them are missing remote management. Is this a problem? Yes, if you want to make sure you're providing flexible features, regular updates, and fast, zero-touch maintenance. Here's why you should focus on enabling SD-WAN via a cloud architecture.

Content type: Blog Post

Links:

For Business Users, Skype Teams is the now the Only Game in Town

Edgewater Networks has previously written about Microsoft's Slack-alike, Skype Teams, and how they hoped to carve out their share of the collaboration market. It now appears that the Seattle giant is going all in with this bet, as they're now heavily promoting Skype teams and moving their previous communication leader, Skype for Business to the back burner. What will this mean for service providers?

Content type: Blog Post

Links:

PCI Compliance for Channels, VARS, and Other Resellers

In the wake of the Equifax breach, customers will be more cautious than ever about security. If you can't convince your customers that you're handling their payment information in a secure and responsible manner, expect renewals to plummet. Here are some facts about PCI compliance that you should know about in order to protect your customers and yourselves.

Content type: Blog Post

Links:

Reality Check: Is Your Solution Better than Your User's Home Networks?

Over the past five years, there's been an explosion in the number of people who choose to work from home. In large part, this is because they believe that their home networks and technology are superior to what they find in the office environment. With more people working from home, there are fewer seats for resellers to support --- which is bad news for renewals. Here's how resellers should re-evaluate the solutions they're selling.

Content type: Blog Post

Links:

6 Steps to Avoid a Doomed CRM Implementation

Implementing a decent CRM is half the battle when it comes to streamlining customer renewals. Yet these projects still fail often, and they often take down careers in their wake. Here are the best ways to manage the storage, bandwidth requirements, processing power, and technical ability to ensure that your CRM performs to the utmost.

Content type: Blog Post

Links:

(n) Critical KPIs for Internal Helpdesks

Answering the following four questions (or ones like them) will give you an excellent idea of how well your helpdesk is doing: 1. How long does it take to respond to a ticket? 2. How often can you solve a ticket at first contact? 3. Are end users responsive to helpdesk instructions? 4) How many unresolved tickets are left at the end of the day?

Content type: Blog Post

Links:

(n) Ways to Boost First Call Resolution

How can helpdesks increase the rate at which they solve issues in just one interaction? Examples include boosting the knowledgebase with instructions that address known issues, increasing agent autonomy, upgrading underlying infrastructure, creating multiple channels to contact helpdesk support, and more.

Content type: Blog Post

Links:

Top (N) Issues with AWS EC2

Many businesses build their more mission-critical applications around EC2, and if it fails, they fail. Common problems include your application being rate-limited by EBS, hpyervisor diverting CPU cycles away from an AWS instance, and memory deficits. Here's how to find, fix, and mitigate.

Content type: Blog Post

Links:

Top 4 Fintech Predictions for 2018

(1) China’s ban on ICO’s will have ripple effects across the industry (2) In spite of this (perhaps because of it) applications involving the blockchain will finally begin to mature (3) Ongoing Brexit negotiation’s won’t affect Britain’s position as fintech central (4) A wave of consolidation might leave traditional banks as fintech winners

Content type: Blog Post

Links:

N Ways that Banks Must Achieve CX Parity with Fintechs in 2018

(1) Adapt to the speed of a millennial-driven industry (2) Build in banking across social media channels (3) Add on AI and NLP

Content type: Blog Post

Links:

Last Year's ICO Wave Lost $400 Million to Fraud

Initial Coin Offerings (ICOs) represent the Wild West of finance. This unregulated form of venture capital is extremely vulnerable to both robbery and fraud. A new Ernst and Young report shows that nearly $400 million worth of currency raised via ICOs last year has been either lost or stolen. What makes cryptocurrency so vulnerable?

Content type: Blog Post

Links:

Exploring Anonymous Application Access

Unpacking the use-cases of anonymous application access, such as bank customers uploading check images, job applicants uploading resumes, and more. How can attackers exploit these systems, and how can companies defend them?

Content type: Blog Post

Links:

73% of Cloud Cyberattacks Focused on Web Apps

End users are rightfully worried by new research showing that web applications are a target for hackers. These attacks allow bad actors to deface websites, collect data on your customers, and steal payment information. Here’s how these attacks work – and how to shut them down.

Content type: Blog Post

Links:

Your Hybrid Cloud Isn’t Too Complex to Secure

Your perimeter is complicated. Providing security for both on-premise services and cloud applications may seem like a huge hurdle, but it doesn’t have to be. Here are a few steps to take that will increase the security of your hybrid cloud deployment

Content type: Blog Post

Links:

Why is Object Storage Analytics So Complicated?

Three or four reasons: 1. The absolute amount of data is always increasing, and analytics platforms such as Splunk and Hadoop still aren't quite up to task. 2. Object storage isn't quite incompatible with NFS and SMB. 3. It's difficult to transfer data to object storage. If not all data gets there, your analysis becomes incomplete.

Content type: Blog Post

Links:

Your G Suite Will Now Include Salesforce – Can You Monitor Them Both?

The G Suite API is now gearing up to import information from Salesforce and vice versa. This will give sales and marketing personnel a useful tool to analyze response rates on their emails, but are IT managers set up to monitor increased strain on both applications?

Content type: Blog Post

Links:

Switching to SD-WAN – Should You Ditch Your MPLS?

Nearly 80% of organizations that have adopted SD-WAN. There are a number of ways to entangle SD-WAN and MPLS, and hybrids of the two systems can produce compelling reductions and cost and increases in speed. What are the best ways to monitor and debug a hybrid network?

Content type: Blog Post

Links:

The GDPR Will Change the Way Companies Offer WiFi

The GDPR (a new compliance regime that will affect companies doing business in the EU) is taking effect in May 2018. It forbids the practice of offering free wifi in exchange for personal data. It also requires more active security monitoring practices, as well as WPA-TKIP authentication. How will this change the way that companies monitor WiFi in 2018?

Content type: Blog Post

Links:

N Potential Failures in Fintech

(1) The bottom falls out of BitCoin, Ethereum, and every other cryptocurrency (2) Investors will worry about seeing returns from a fundamentally slow-moving industry within their investment horizon (3) Increased regulatory hurdles, such as the GDPR, will stifle fintech innovation (4) Economic cycles, from rate hikes to recession, might interfere with fintech growth

Content type: Blog Post

Links:

Placeholder Assignment #1

TBA

Content type: Blog Post

Links:

Placeholder Assignment #2

TBA

Content type: Blog Post

Links:

Placeholder Assignment #3

TBA

Content type: Blog Post

Links:

Writing Test

Per your message.

Content type: Blog Post

Links:

The GDPR is on its way. Can Smart Object Storage Help?

One premis of the GDPR is that even though it's an EU regulation, it will affect American companies who work in the EU, work with EU companies, or do business with data from EU citizens. That's a very wide net, which means its likely that several US companies will have a nasty surprise this May when they learn that the GDPR affects them after all. Smart Object Storage could be a lifesaver for these companies, letting them tag and organize data from EU citizens on an immediate basis.

Content type: Blog Post

Links:

Using Jenkins for Automated Testing

What can't Jenkins do? Envisioned as an automated CI/CD tool, Jenkins provides helpful automated testing and deployment tools for teams that are starting to experiment with DevOps. Here's a short explainer of how to use Jenkins as an automated testing tool.

Content type: Blog Post

Links:

SMBs Are the Largest Part of the hPBX Market -- So Why are Enterprises Growing Faster?

Large enterprises are going to double their usage of hPBX by 2022 -- and they're also among the hPBX customers least likely to churn. However, it's the SMBs who still make up the largest untapped fraction of the hPBX market. What are service providers still getting wrong?

Content type: Blog Post

Links:

Bank Customers -- Anonymous Application Access

It may seem like a simple exercise to give bank customers or vendors the ability access a banking application, but that's far from the truth. Banks have had a legendary amount of difficulty adding new features due to the difficulty of integrating their legacy core systems. Safe-T lets banks add anonymous application access quickly and securely.

Content type: Blog Post

Links:

UC use-cases for MSPs

Over 60% of consumers will still call a business as their first course of action if they want a question answered. Therefore, there are still huge and robust reasons why business owners need intelligent, scalable, and cost-effective phone systems. Here are a few ways that MSPs can continue to sell UC, even as phone systems begin to look out of date.

Content type: Blog Post

Links:

Secure Cloud Storage Access - integrating cloud storage with on-premise solutions

It's still rare for any organization to move 100% of their enterprise into the cloud. Organizations usually keep several applications on-premise, and use the cloud for solutions such as storage. There are a few methods to integrate cloud storage in this manner, such as tiering via a cloud gateway -- let's look at the options available and see which is best for your organization.

Content type: Blog Post

Links:

Secure Email Blog

Email is a still a primary source of communication between firms, but it's also the largest source of data loss and compliance breaches. If you're using the default email client that came with your computer when you took it out of the box, you're probably using it wrong. Here's the correct way to configure business email for compliance and security.

Content type: Blog Post

Links:

How to Build a Bank (from scratch) Out of Microservices

I'd like to adapt the attached PDF powerpoint into an OpenLegacy blog. It's a very good explainer of how a midsized firm used a microservices to create a bank from the ground up, with additional lessons on how to go from a monolith to a distributed app. I think we could make this work as an intro to microservices for our new blog series.

Content type: Blog Post

Links:

What do Marketers Need to Know About the GDPR?

There are now just five months until landmark privacy legislation takes hold in the EU. Many US and international marketers haven't paid much attention to the GDPR, but the GDPR will affect companies whether they're in the EU or not. This new compliance regime will completely change the way companies collect and analyze data -- a change which will change the marketing discipline in turn.

Content type: Blog Post

Links:

2018: The Year the WAN Changes

The new year won't just bring SD-WAN dominance -- it will usher in SD-WAN 2.0, with a focus on multi-tenancy and security. For early adopters, this means that the standard SD-WAN platform that they've gotten used to is about to change dramatically. What should they watch out for?

Content type: Blog Post

Links:

Top 3 Ways the GDPR Will Change US Companies in 2018

The GDPR is coming online in May 2018, and most US companies still haven't thought about how the GDPR will affect them. Whether they have a business presence in Europe, work with vendors from the EU, or even just attract European web traffic, the GDPR will affect US companies. With fines projected to be 79 times higher under new regulations, how will US companies adapt in such a short time?

Content type: Blog Post

Links:

How to Get Certified in AWS

Building off your recent interview with the AWS CISO, I thought it would be a good idea to get started with some additional AWS content. This would include the types of AWS certifications, ways to get help with the exam, the exam roadmap, and so on.

Content type: Blog Post

Links:

Enterprise VoIP has Finally Exited the Hype Phase

There's a difference between a hyped technology and a stable technology. Technologies that are hyped tend to perform below high expectations, whereas stable technologies meet expectations. In 2018, VoIP has finally moved into the stable technology column. It is becoming a ubiquitous, well-understood technology that rarely breaks. How has this happened, and what will the future bring?

Content type: Blog Post

Links:

What Happens When You Combine UCaaS with SD-WAN?

The use-case for combining UCaaS with SD-WAN is not apparent at first glance. Most articles out there are making a case for combining SD-WAN with MPLS, for example, with UCaaS regarded as an afterthought. Bundling SD-WAN with UCaaS makes a compelling business case, however. especially for companies without preexisting IT infrastructure. Here's how it works:

Content type: Blog Post

Links:

The Apple Slowdown Scandal -- What it Tells us About Mobile Trade-Ins

It was recently revealed that Apple has been slowing down older iPhones in order to compensate for aging batteries. The resulting scandal represents a fail-state for device trade-in solutions. This article will discuss ways that mobile phone companies could improve their device trade-in and refurbishment programs to improve customer goodwill and generate ROI.

Content type: Blog Post

Links:

3 Cool Ways to Reuse Your Old Smartphone

Under the device processing and liquidation heading. This article will showcase interesting upcycling scenarios for used smartphones (using them to mine cryptocurrency, control a smart home, or even as a dedicated VR headset). This would be a good way to segue to talk about how phones can be re purposed on an industrial scale with Hyla.

Content type: Blog Post

Links:

Using Device Collection to Capture Consumer Information

Under the omni-channel device collection vertical. Talking about how a device collection lets manufacturers and carriers close the loop on customer behavior analytics. In effect, the way a consumer turns in their old phone reflects the way that they'll purchase a new one.

Content type: Blog Post

Links:

Worldwide Privacy Laws: Japan

Changes to Japan's venerable digital privacy law, the APPI, took full effect in mid-2017. The largest effects of these changes were to establish a centralized data protection commission, similar to Europe's ICO, and also to establish a new national ID system. In many ways, this system apes the GDPR -- yet another reason why firms who aren't affected by that regulation should still attempt to comply with its dictates.

Content type: Blog Post

Links:

Global Data Privacy Laws: The Philippines

The Philippine Data Privacy Act is an outlier among data privacy laws. Unlike many other laws, it specifies prison time -- up to six years -- for entities failing to follow its tenets. Here's how the law works, and how to avoid falling afoul of the authorities.

Content type: Blog Post

Links:

Global Privacy Laws: South Korea

Unlike other Asia-Pacific democracies, South Korea didn't update its privacy laws this year. In fact, its first digital privacy law wasn't passed until 2011, making it a relative latecomer. South Korea has a fairly robust law, allowing it to deal with frequent cyberattacks from China and North Korea. Upcoming talks between South Korea and the US represent a further opportunity for strengthened digital privacy in the ROK.

Content type: Blog Post

Links:

Safe-T Momentum Blog

Recap the press release, without being to sales-y about it. My thesis will be that 2018 will be an interesting year for enterprises (with the advent of the GDPR, aftermath of Equifax, and ramifications from future breaches). Safe-T has positioned itself to be the best partner for enterprise data security in what's sure to be another trying year.

Content type: Blog Post

Links:

indiana Office of Technology

I'm going to turn the associated press release into a more anodyne, less sales-y format -- think of it as a mini case study. I'll go over the IoT's pain point (providing a high level of protection while maintaining a user-friendly interface), relate it to the woes of other enterprises at scale, and then introduce Safe-T.

Content type: Blog Post

Links:

Guide to AWS Certification

If you're creating an application that's supported by cloud infrastructure, that cloud is overwhelmingly likely to be part of AWS. Since there is currently a shortage of expert cloud practitioners, it's worth knowing what an AWS certification offers, and how to get it. Then I'd talk about Virtualmind's staff augmentation offering.

Content type: Blog Post

Links:

The Far Frontier of UCaaS: Quantum VoIP?

High security and low latency are the Holy Grail for VoIP providers, and research shows that the silver bullet for these problems might not be far off. Practical quantum-entangled communications aren't quite workable yet, but the technology is taking major strides out of the realm of pure theory. Here's how it works:

Content type: Blog Post

Links:

2017 in DevOps News

A retrospective of the most exciting news in DevOps in 2017, with predictions for the future. Examples include rates of DevOps adoption, advancements in automation, progress in DevOps culture, and more.

Content type: Blog Post

Links:

Supply Chain Cyberattacks

The rise of "as a Service" companies means that the corporate supply chain is more complicated than ever. Your company probably doesn't do its own hiring, accounting, or software development in-house. Instead, these services are done by vendors -- some of whom are probably vulnerable to cyberattacks. How can you guard against infiltration through the supply chain without losing your invaluable vendors?

Content type: Blog Post

Links:

Secure Data Access in an IIoT Context

In practice, Industrial IoT (IIoT) systems are supposed to be air-gapped from the internet. In practice, administrators will often, either by accident or on purpose, leave bridges open from corporate networks to the IIoT. If it turns out that the air gap isn't a viable security strategy (which it might) then the next best thing is to hide these systems from the internet in other ways. Here's how to do that with Secure Data Access.

Content type: Blog Post

Links:

Industrial IoT -- Facing a Nuclear Cyberattack

Over the last few years, we've taken tentative steps into an era where hackers can manipulate digital systems to create physical outcomes. As our physical infrastructure has taken on more and more digital controls, the risks have become worse and worse. Nowhere is this risk more apparent than in the realm of nuclear energy. What threats is this industry facing, and how does the industrial IoT contribute?

Content type: Blog Post

Links:

Open Banking vs. the GDPR

The dichotomy between the GDPR (which battens down the ways that EU banks can use customer data) and the Open Banking initiative (which opens data up to third party vendors) hasn't really been explored by OpenLegacy. How are banks going to comply with Open Banking and PSD2 while simultaneously treating their data responsibly as dictated by the GDPR?

Content type: Blog Post

Links:

5 Ways Legacy Technology is Hampering Insurance Companies

1. Lack of personnel skilled in COBOL 2. Can’t provide user-centric customer experience 3. Lack of customers responsiveness 4. Agents deprived of critical tools 5. Decreased competitiveness

Content type: Blog Post

Links:

4 Ways the Insurance Industry can Fix its CX Problem

Consumers need things that insurers aren’t handing out. Improving insurance CX is a vast undertaking with many starting points, however – where to begin? Headings will include: Feedback collection. Feedback analysis using voice and text analytics. Apply feedback holistically to all service offerings. Operationalize data. All of these will in some way involve microservices

Content type: Blog Post

Links:

(n) Ways to Avoid Bandwidth Hurdles While Connecting to the Cloud

Public internet access has little appeal when it comes to mission critical cloud connections. High latency, low bandwidth, and patch speeds depending on location are just a few hurdles that companies must endure. Here are a few ways that companies have developed workarounds:

Content type: Blog Post

Links:

How to Benchmark Your Public Cloud

If you're paying for SaaS or cloud storage, you need to make sure that you're getting what you pay for. These services are expensive enough as it is, and any measurable decline in performance beyond the dictates of the SLA has a ripple effect in terms of productivity. Here's how to measure your cloud performance and negotiate accordingly.

Content type: Blog Post

Links:

AWS Monitoring Tools Explained

Hi Christine! I recently saw your AWS monitoring blog post, and it reminded me of a technical webinar that I recently sat in on. It described in-depth the process of creating lamdas to automatically respond to certain security threats, and I think I could spin that into a more in-depth blog about how to configure the AWS security dashboard. What do you think?

Content type: Blog Post

Links:

Unpatched Routers Playing Host to Millions-Strong Botnet

Mirai all over again? A new IoT botnet is forming powered by an unpatched vulnerability in routers produced by a South Korean company known as Dasan Networks. There are approximately 13,700routers becing infected per day, and a wide attack surface for hackers to chose from. Worse, the router manufacturer appears to have no interest or intention of ever patching the vulnerability. Here's how to defend yourself from the next mass IoT botnet, and how to learn if your IoT devices are compromised.

Content type: Blog Post

Links:

OpenLegacy Case Study

Per upcoming conference call. Best way to reach me and schedule is andrew@ndashmarketing.com.

Content type: Article

Links:

What's New in InsurTech for 2018?

Insurance and reinsurance companies have dramatically increased their investment in InsurTech startups in 2018. It's obvious from this pattern of action that they're attempting to control the direction of innovation within the industry, but what direction are they steering it in? Here's why most incumbents are still at risk of disruption.

Content type: Blog Post

Links:

Security Marketing in 2018 Will be All About CryptoJacking

Here's a problem that's new in the age of cryptocurrency: cryptojacking. Imagine visiting a website with online ads. All of a sudden your computer's fans turns on. All of your applications slow down and your CPU usage spikes up. You've just been cryptojacked -- a malicious online ad has used your PC to mine cryptocurrency without your permisson. This is an entirely new security vulnerability for 2018 -- affecting website owners and enterprises alike. Here's how to market to them both.

Content type: Blog Post

Links:

Law Firm Data is Catnip for Hackers

Data from law firms is full of profitable secrets. Instead of encrypting data or selling off files record-by-record, successful hackers can make a huge profit all at once by insider trading. What’s worse is that law firms tend not to have the best security, despite the value of what they’re guarding. Here’s where law firms are missing out on their security – and how they can get it back up to par.

Content type: Blog Post

Links:

State-Level Cybersecurity is Hard to Fix

Back in 2015, an audit of California state cybersecurity saw showed that 77 of 73 state departments were not in compliance with reasonable security standards. Three years later, and the state still hasn’t stemmed the bleeding, with hackers making off with thousands of state employee records just last month. What are the common failings in state-level cybersecurity, and why are they so hard to fix?

Content type: Blog Post

Links:

SWIFT Attackers Strike Again

Two years ago, a group of unknown hackers were able to gain control of the SWIFT system – a payment ledger that connects hundreds of banks worldwide – and almost used it to steal billions of dollars. Now, those same attackers are back, attacking targets in India and stealing $6 million from a bank in Russia. This attack shows that banks badly need to upgrade their payment systems in order to prevent these attacks – here’s how.

Content type: Blog Post

Links:

Top (n) Issues When Debugging EC2

Hi there! I've been reading your backlog of articles, and I thought you may need some content around debugging cloud environments. I wrote an article for AppNeta about this topic late last year (linked in the Source Links section), and I think I could use that as a springboard to generate some content for UTest. What do you think?

Content type: Blog Post

Links:

Understanding Statistical Distances in Machine Learning

In Big Data analytics, the details matter. Human analytics spend a lot of their time staring at nearly-identical graphs and charts and trying to understand whether the differences are meaningful. Machine learning makes the process easier, but there's more than one way to train a model. Here, we'll briefly discuss mechanisms such as Kolmogorov-Smirnov, Cramér-von Mise, and the Earth Mover's Distance and how they're useful in pointing out anomalies in your data.

Content type: Blog Post

Links:

Understanding Statistical Models in Machine Learning

In Big Data analytics, the details matter. Human analytics spend a lot of their time staring at nearly-identical graphs and charts and trying to understand whether the differences are meaningful. Machine learning makes the process easier, but there's more than one way to train a model. Here, we'll briefly discuss mechanisms such as Kolmogorov-Smirnov, Cramér-von Mise, and the Earth Mover's Distance and how they're useful in pointing out anomalies in your data.

Content type: Blog Post

Links:

Facebook vs. Cambridge Analytica: Breach or Not?

It's more than a semantic debate. It's certainly clear that what Cambridge Analytica did to millions of Facebook users was a violation of the site's TOS, but if it was a breach, then things get trickier. A breach means that Cambridge Analytica may face criminal liability. A breach may also mean that Facebook draws the ire of increasingly skeptical regulators. So, what happened -- and was it a breach or not?

Content type: Blog Post

Links:

Exploring Computer Forensics in the Field

Hi there! As I've looked over your site, I thought it would make sense to add some ancillary content about how to transport computers that are in the field and must be moved without being shut down. This could explore devices such as hot plugs, mouse jigglers, portable batteries, etc. While I know that you don't supply these devices, I think it would be interesting to your readers -- and quite easy to tie back into Black Bag with a CTA at the end.

Content type: Blog Post

Links:

How Network Segmentation Delivers Stronger Security

Creating a new network is always a challenge -- so why would anyone bother extending that challenge by making segmented networks within a larger one? Although this may be technically difficult, you might find that this is one of the best ways your company can stave off hacking attempts. In the meantime, network segmentation might also make it easier for you to become compliant with rules like HIPAA and PCI-DSS. Here's how it works:

Content type: Blog Post

Links:

How Will the GDPR Affect US Marketers?

The GDPR -- which comes online in just a few weeks -- represents a thoroughgoing change in the way that data-driven marketing will be practiced. It's effects will certainly reach across the Atlantic, especially if companies deliberately target their marketing towards EU or UK citizens. How will the GDPR change the ways that US companies can market across the Atlantic?

Content type: Blog Post

Links:

Is Satellite Internet About to Change Everything?

Elon Musk's SpaceX just got approval from the FCC to start launching a constellation of satellites that might blanket hard-to-reach areas with high-speed internet. Naturally, this raises a lot of questions. How will satellite internet work? Is it feasible for enterprises, or just consumers? What are some potential issues and advantages? Is this just going to be another version of a WISP? Let's answer these questions and more.

Content type: Blog Post

Links:

The Importance of Connecting Legacy Infrastructure to the Cloud

If you're still running the backend of your business on an AS/400, most people would say it was time for a change. For some businesses, however, the expense and difficulty of a hardware refresh dwarfs the inconvenience of keeping old technology limping along. Here are a few ways businesses can keep their customer-facing systems relevant while preserving an antiquated backend.

Content type: Blog Post

Links:

3 Reasons to Let Someone Else Handle Your Kube Deployment

You've chosen a containerization system, and you've chosen Kubernetes. It might be a good idea to let someone else take it from here. Kubernetes is interesting in that it constantly throws off new releases -- usually at a pace that's too fast for enterprises to match. If you can't patch Kube as fast as it's being updated, you're potentially losing out on features and stability. On the other hand, a third-party with Kube experience will be able to help you cherry-pick updates.

Content type: Blog Post

Links:

3 Ways the Adidas SpeedFactory Combines Manufacturing and CX

The idea of having a product custom-tailored to you--and only you--has previously been an inaccessibly upscale experience, out there in the realm of bespoke suits and personal yachts. Adidas, with their SpeedFactory, have done what's seemingly impossible. They've elevated the sneaker to the status of a bespoke product (which has been done before), but they've made the creation process faster and more efficient than traditional mass manufacturing (which hasn't). Here's what they're up to:

Content type: Blog Post

Links:

Spotlighting Microservices for Rapid Application Prototyping

A more technical blog post about how companies can use small, independently-deployable microservices to create applications (such as websites) faster. This process ultimately results in failure-tolerant apps that can be quickly updated to respond to customer demands. I'm making the heavy assumption that microservices are part of your work at Verndale. If they aren't, I still think you should have a blog post that helps explain the underpinnings of your methodology.

Content type: Blog Post

Links:

Protect SWIFT Terminals with Your SOC

Over the past few months, a number of attackers have been able to compromise SWIFT banking terminals in banks located in Russia and India using methods similar to the 2016 Bangladesh Bank heist. In every case, the attackers have resorted to the same tactic, taking advantage of poor network segmentation and lax security practices. Here’s how a proper SOC could forestall these thefts.

Content type: Blog Post

Links:

Should You Outsource your SOC?

Short answer: You can outsource your SOC, but you shouldn’t outsource all of it. According to the 2017 SOC survey, the state of the SOC as a whole is maturing, but there are some weak points. Outsourcing some of your SOC functions may allow you to reinforce those weak spots – but you have to outsource the right functions. Here’s what to look out for:

Content type: Blog Post

Links:

Screening Out False Positives within your SOC

Alert fatigue is a real thing, and it’s serious. The average SOC receives hundreds of false positives per day – up to 15,000 per day in extreme cases. This volume of alerts can disguise real threats, but many administrators find it difficult to cut down the chaff. Here are a few ways to add SIEM rules and automated incident response routines in order reduce false positives and improve security:

Content type: Blog Post

Links:

How is Elon Musk's Starlink About to Change the Internet?

SpaceX just got approval to launch a satellite internet constellation with the aim of blanketing previously hard-to-reach areas with high-speed broadband internet. Has this been tried before, and is satellite internet going to be an option for enterprises in rural areas? No matter what, AppNeta will probably end up monitoring it.

Content type: Blog Post

Links:

Creating a Secure Data Workflow with SDE

Tracking the journey of a file secured by Safe-T, from arriving in a mailbox to ending up in secure file storage and everything in between.

Content type: Blog Post

Links:

Exploring the Implications of the Atlanta Ransomware Attack

We've seen ransomware attacks take down transportation networks before -- see the San Francisco Muni Hack -- and we've seen ransomware take down entire companies before. What we've never seen before is how ransomware looks when it's affected an entire city. Based on the difficulties that citizens have had paying their bills, addressing parking tickets, or setting up court dates, it speaks to the need for a robust KYC system that operates independently of a centralized city government.

Content type: Blog Post

Links:

Hacks Up -- But Leaked Records Down? Blame Ransomware

The amount of recorded cyberattacks ticks up every year -- but last year, the number of breached records went down. No, we didn't finally discover the perfect antidote to cybercrime. What happened instead was ransomware. A new report shows that the number of breached records dipped by 25% last year -- about 2.5 billion files -- due to the rise in encryption attacks. What does this say about the future of malware and security?

Content type: Blog Post

Links:

Integrating Multi-Cloud Data for Greater Security

Running security for one cloud is hard enough, with unfamiliar tools that work differently from their on-premise counterparts. Now that most businesses run multiple clouds, security just got that much harder. Learn how you can leverage the power of integration to receive real-time security analytics across multiple clouds.

Content type: Blog Post

Links:

Introduction to Mobile UCaaS

A new study from Eastern Management Group predicts a dramatic rise in mobile UCaaS in the next four years. Is it time to hop on the bandwagon? Mobile UCaaS offers the ability to continue complex, multimedia conference calls across multiple network shifts, without dropping calls. In addition to increased reliability, Mobile UCaaS providers promise higher QoS compared to traditional MNOs. Can they back these promises up?

Content type: Blog Post

Links:

Ransomware Hits Peak?

A new IBM study shows that last year, ransomware got so popular that it accounted for a 25% *decrease* in stolen files -- said files were encrypted instead. Although that's a troubling data point, it may be a sign that ransomware has actually reached its zenith. People are relying more heavily on backups, and they know not to pay the ransom. That said, ransomware has definitely changed the landscape for good, with new malware -- focused on crypto-mining software -- rising to replace it.

Content type: Blog Post

Links:

The Software-Defined Perimeter isn't a Firewall -- It's IAM

An recent article on CSO Online posits that most business leaders aren't budgeting for the Software-Defined Perimeter because most truly don't understand what it means. Many tend to think of it as a nested set of software firewalls, as opposed to what it truly is -- a strong set of dynamic access and authentication protocols. This misunderstanding is reflected in relatively low SDP adoption. How can vendors and resellers get past the misleading nomenclature?

Content type: Blog Post

Links:

Tensorflow 101 -- What you need to know about the Open Source AI Platform

Tensorflow has emerged as a powerful tool that lets companies jump-start a digital transformation. This article will describe a few introductory use-cases for Tensorflow, as well as a high-level introduction to its salient concepts -- tensors, scalars, vectors, etc.

Content type: Blog Post

Links:

What is the TCO of Cloud First?

Does a Cloud First strategy really have a lower cost of ownership than a cloud-first or managed services approach?

Content type: Blog Post

Links:

Concerned About the GDPR? Learn how Google does it

As the eve of the GDPR approaches, we're starting to see how some of the largest companies on Earth are preparing their compliance strategy. Among them, Google is an exemplar, with a clear privacy policy and more transparent options for exporting data. Can this be a model for smaller businesses?

Content type: Blog Post

Links:

Open Banking vs. the GDPR

The dichotomy between the GDPR (which battens down the ways that EU banks can use customer data) and the Open Banking initiative (which opens data up to third party vendors) hasn't yet been fully explored. PSD2 is supposed to force banks to fully modernize the way that customers make payments -- a path forward that includes mobile banking. How can banks fully open their APIs for mobile banking vendors, while still complying with the data sharing restrictions of the GDPR?

Content type: Blog Post

Links:

With Zelle, Banks Stumble on Mobile Payments

Zelle is supposed to be banks' answer to mobile payment apps such as PayPal and Venmo. It hasn't been unsuccessful, either -- last year, $75 billion USD was tranferred via Zelle, more than twice the amount of money processed by Venmo. Zelle's problem, however, is that many of the payments made through it are fraudulent -- some analysts have seen a 90% fraud rate among transactions. How are con artists misusing Zelle -- and can banks fix the problems before its users desert it?

Content type: Blog Post

Links:

2018 -- The Year in Tech

From the growth of the cloud to the difficulties posed by VAT in the UAE, did our predictions bear out? Here's what changed in the world of tech in the middle east and across the world.

Content type: Blog Post

Links:

If You Use PGP, Stop Right Now

“Email is no longer a secure communication medium,” due to a new vulnerability in PGP and S/MIME known as EFAIL. Any email encrypted using those protocols can now be read in plaintext due to a vulnerability that exploits HTML. The implications of this are crazy, and the future of secure email is suddenly in doubt. Ditch PGP now!

Content type: Blog Post

Links:

2018 -- the Year in Tech

From the growth of the cloud to the difficulties posed by VAT in the UAE, did our predictions bear out? Here's what changed in the world of tech in the middle east and across the world.

Content type: Blog Post

Links:

The Value-Add of Product Artwork

Product packaging and artwork can be expensive to produce and often difficult to manage -- so what's the ROI? How much more value can you expect to generate from a product with well-designed and branded packaging, versus the same product sans package? Here's what you need to know.

Content type: Blog Post

Links:

Ins and Outs of managing an artwork design team

Artwork design is about so much more than graphic design. While creativity is involved, cross-departmental collaboration is arguably much more important. As a manager, your responsibilities will include hiring designers and researchers who can create and use great artwork, developing an over-arching strategy that to deliver artwork as part of a holistic product lifecycle, and passing feedback from multiple stakeholders on to the relevant personnel in your department. Here's how to do it well:

Content type: Blog Post

Links:

(n) Reasons Why Eco-Friendly Packaging is Worth It

Your customers may like environmentally friendly packaging -- but do they like it enough to matter to your bottom line? Increasingly, the data say yes: (1.) 80% of consumers now expect environmentally friendly packaging from companies. (2.) 88% of consumers identify as socially responsible. (3.)Over half of customers will avoid excessively packaged products.

Content type: Blog Post

Links:

Regulatory Labeling in the Food & Beverage industry

Hello, and thanks for your pitch request! I'd be happy to write a blog based around this topic. Are you interested in an article based around any particular news piece, such as food fraud, NAFTA negotiations, or new menu labeling rules, or should the piece rely mostly on the supporting materials?

Content type: Blog Post

Links:

IoT in Transition: From Manufacturing to Consumer and Enterprise Spaces

The very first IoT devices were meant to monitor temperature, pressure, and vibration in manufacturing capital equipment. Since their adoption by manufacturing, IoT devices have begun to filter into the consumer and enterprise spaces. Often the very same sensors are being used for different purposes -- such as creating greener buildings, more comfortable and productive employees, and more hygienic healthcare facilities.

Content type: Blog Post

Links:

10 Ways to Enhance Your View of the Customer Journey by Adding AI

Mapping a customer journey has become a signal-to-noise problem in the digital era -- too many channels and customers to monitor effectively. Adding AI to the customer journey mapping process lets you (1.) Identify your most influential social media followers (2.) Discover the most effective ways to nudge a stalled buying process. (3.) Enhance your most popular landing pages. (4.) Discover more effective ways to upsell repeat customers (5.) Build a clearer customer persona -- and more

Content type: Blog Post

Links:

Red Team 103: SQLmap

Continuing the Red Team series, if you're interested. This tool automatically finds vulnerable fields and performs SQL injection attacks.

Content type: Blog Post

Links:

Solving Charging Problems During a Time of Network Migration

First, telecoms sold voice as a monthly service. Then, they sold cellular service by the minute. No? Customers make calls over WiFi, VoLTE, SIP, 3G networks, 4G networks, and more. Understanding how customers and partners are using your data services, finding a fair price for it, and actually collecting revenue has turned into a massive problem over the last few years. Here's a good sense of what that problem looks like, and how to fix it.

Content type: Blog Post

Links:

How to Block Back TLDs

Here's the gist -- if you click on a URL that ends with something like .cm, .bad, or .men, you're asking for trouble. Most of these Top Level Domains (TLDs) host malware, send out spam, or worse. Here's how to block these harmful TLDs from your email and network:

Content type: Blog Post

Links:

Your Legacy Access Tool Doesn't Work with the Cloud

Why tools like Active Directory no longer cut it in the era of digital transformation.

Content type: Blog Post

Links:

4 DMZ Best Practices to Shield You From Attackers

DMZ Best Practices: (1.) Separation of access from authentication (SDP) (2.) Reverse access (3.) Reduction of services published to the web (4.) Removal of critical assets back into the enterprise

Content type: Blog Post

Links:

You can't fix authentication without fixing access

Today's access and authentication systems are putting the cart before the horse. Many applications provide access to users before authorizing them -- greatly increasing their attack surface.

Content type: Blog Post

Links:

DevOps is hampered by access

Devops and “shift-right” is only as fast and agile as the slowest, weakest link in the chain and Access is one of those weak-links

Content type: Blog Post

Links:

RPD Credential Theft Affecting Hospitals, Airports, and More

RDP lets employees access computers inside your network remotely, and it's proven an Achilles' heel for otherwise secure organization. In the most recent iteration of an RDP incident, security researchers found credentials for hospitals and airports obtained via brute force attacks on RDP portals. They were for sale on the dark web for just $10. What are the problems with RDP, and how can organizations make their RDP portals more secure?

Content type: Blog Post

Links:

Blank piece

See Cannabis Labeling article

Content type: Blog Post

Links:

Exploring the Future of the IoT

Although securing the present-day IoT is still very much an ongoing project, researchers are still busily plunging ahead with the next iterations of the technology. Analysts predict that within a few years, concepts such as fog computing and smart dust will enter the mainstream. What will these technologies look like, and how will we defend them from attack or misuse?

Content type: Blog Post

Links:

Exploring the CTIA IoT Certification

The CTIA a telecom industry association comprised of the country's largest carriers, has recently announced a certification program aimed at IoT devices. Based on recommendations from the NIST, the CTIA's certification program aims to create secure standards for IoT devices that will soon power our critical infrastructure -- smart cities, autonomous cars, and more.

Content type: Blog Post

Links:

It's time to Start Using DNSSEC

Man-in-the-Middle attacks are one of the biggest security problems in IT. Secure DNS protocols could fix this, but they're not widely in use. Why not?

Content type: Blog Post

Links:

You Could Almost Use SIP to Call Websites

Imagine an alternate version of the present: You want to call a company, but you don't know their number. Instead of looking it up on google, you type their website into your phone app, and automatically call them. The SIP protocol makes this possible -- so why does no one use this feature? Let's find out.

Content type: Blog Post

Links:

T-Mobile Stored Passwords Insecurely

I wanted to write this as a quick follow-on to our identity blog. Basically, what I'd be saying is that even if you store your information with a large, reputable company, there's no guarantee that they'll treat your data with respect. See source link for more information.

Content type: Blog Post

Links:

Want to Make $100 Million from Hacking? Steal Press Releases

News wires keep and hold lots of information -- about mergers, acquisitions, and other sensitive data -- that shouldn't be announced. They're a prime candidate for hacking, and the stolen information is, as the title suggests, very lucrative. Here's how hackers made $100 million from stolen press releases -- and how Safe-T could have stopped it.

Content type: Blog Post

Links:

test pitch

test test test

Content type: Blog Post

Links:

Is your data slowing down -- or are you being throttled?

We've all seen the story of how Verizon apparently throttled communications between firefighters battling the largest wildfire in California history. You might be next. Here's why telecom giants might throttle you, how to tell if you're being throttled, and how to get them to stop.

Content type: Blog Post

Links:

Breaking the Chokehold -- how to tell if your network is being throttled

Firefighters battling California's Mendocino Complex Fire this July were disappointed (to say the least) to find that their internet connection speeds were being throttled by Verizon. Could you be next? Here's how to tell if you're being throttled -- and how to make sure that it doesn't happen again.

Content type: Blog Post

Links:

Customers Fear Biometric Payments are Too Insecure

Near Field Communication (NFC) is already old news -- most customers don't use it, and many major chains haven't implemented it. Biometric payments are supposed to be the next big thing, but many consumers fear that it will be too insecure to use (which is one of the reasons why NFC sank). Is there a way to make biometric payments secure and change customer perception?

Content type: Blog Post

Links:

Why Did Mobile Payments Flop?

Mobile payments were supposed to be cool -- just tap your phone on a card reader and collect your groceries. Both banks and retailers wanted mobile payments to succeed, but only about 20% of US customers have ever actually made a mobile payment. In a world where retail is flagging and banks are being surpassed by FinTech, innovations like mobile payments cannot be allowed to fail. Is it possible to salvage this technology?

Content type: Blog Post

Links:

130 Million Hotel Customer Breached Due to Exposed Database

Huazhu Group, a Chinese hotel conglomerate, recently confirmed that over 130m of its customers were breached via an exposed database. I'll write the article using the incident as the frame, introduce the idea that this would represent a compliance breach, then provide tips for avoidance.

Content type: Blog Post

Links:

4 Ways for Telecoms to Shut Down Phone Scams

Consumers on six continents are increasingly getting pestered and fooled by scams involving VoIP spoofing -- a process by which a VoIP network is used to send a phone message that appears to originate from a different number than where it was sent. This allows scammers to impersonate debt collectors, banks, tax authorities, and more. Here are a few ways for telecoms to identify and shut down the sources of VoIP phone spam on their networks.

Content type: Blog Post

Links:

Introducing the Micro-Influencer

When you think of an influencer on Twitter or Instagram, you normally picture a young person with tens of thousands of followers. What if we told you that buying their attention isn't worth the ROI? Micro influencers -- subject matter experts with less than 1000 followers -- can convert at a rate that's over 22x their more popular brethren. Here are a few reasons why you should be spending your marketing dollars on micro-influence.

Content type: Blog Post

Links:

Towards Smart Dust: What is the Future of the IoT?

Imagine a networked camera, microphone, or temperature sensor the size of the head of a pin. Unless we begin to hit hard limits on processor design, that's where the future of IoT technology is heading. This article will take a look at the kind of technological innovation needed to produce ubiquitous sensors at this scale, and the societal innovations we'll need to cope with them.

Content type: Blog Post

Links:

IT Startups Need Developers More Than They Need Money

Imagine this: You're Silicon Valley's hottest new startup. You're given a choice -- you can get either $5 million in seed funding, or 3 new software developers. Which do you chose? If you're among the majority of companies, you now find that access to STEM talent is a bigger constraint on growth than access to venture capital. This is a distinct change from the financial landscape as little as five years ago -- so how should the industry proceed?

Content type: Blog Post

Links:

3 New Ways to Solve the Last Mile Problem in Networking

Getting broadband connectivity from the fiber trunk to the business or consumer has been one of the most pernicious problems in networking. There are always companies trying new ways to overcome this challenge, with methods including: 1. Fibre Deep. 2. 5G Internet. 3. Doubling Down with 10Gbps fiber. This article will explore each option -- see source links for background material. CTA will link to Extreme Networks products.

Content type: Blog Post

Links:

What Is a Content Delivery Network?

Hi there! I notice that this content, as it exists on your website, is basically just Lorem Ipsum at this point. I'd be very happy to write a finished article that would fill this space on your page and tie into your Application Services vertical. Is this something you'd be interested in?

Content type: Blog Post

Links:

Exploring the Impact of Tariffs on Supply Chains

Here's the gist: I want to explore the ways that trade tariffs are making it more difficult for industries (in loftware's verticals) to get the parts and raw materials they need. The kicker/CTA: it's time to reduce supply chain costs by moving to smart labeling.

Content type: Blog Post

Links:

Marketing Tactics That Irritate You May Still Benefit Your Customers

Most marketers are internet power users -- they use ad-blockers, disable pop-ups, and navigate around paywalls . They never sign up for the newsletter. Most marketing targets, on the other hand, are simply less online. My goal is to find three or four marketing tactics that marketers themselves would *hate* -- but which consumers would find extremely useful.

Content type: Blog Post

Links:

Monitoring Kubernetes Deployments in the Cloud

Widespread adoption of K8s has blown up traditional application monitoring tools and procedures. Here are some new ways to provide visibility and keep your pods safe.

Content type: Blog Post

Links:

With Few CMOs Satisfied, is Marketing Automation Headed for a Crunch?

It's appropriate to make a big deal out of marketing automation -- after all, there are nearly 7,000 companies in the industry as of 2018, and the number seems poised to grow. That said, it's worth noting how very few marketers -- just 7%! -- are happy with the performance of the products they're using. Does this portend a marketing automation bust?

Content type: Blog Post

Links:

Mirai Botnet Creators Cooperated with the FBI

The Mirai botnet brought down large portions of the internet in 2016 -- but its creators are getting no jail time. Apparently, their assistance to the FIB, subsequent to pleading guilty to creating Mirai and a successor known as Clickfraud -- was enough to secure them a mere five years of probation. I'll tie this into secureRF by talking about how if your built-in IoT security is good enough, you won't have to rely on the expertise of criminals.

Content type: Blog Post

Links:

Welcome to Atom-Scale Radio

More on the future of IoT devices. Scientists have successfully developed an antenna made of single atoms. These antennae, in addition to being extremely small, are strongly resistant to electromagnetic interference. In other words, they're an improvement on traditional radio, and could one day enable IoT devices many times smaller and more secure than the ones we see today.

Content type: Blog Post

Links:

TLS 1.3 has Arrived -- Here's What to Expect

As of August 2018, TLS 1.3 -- the first update to the vital security protocol in over eight years -- has finally launched. With new encryption methods and a simplified architecture, this new version of TLS has the potential to be both faster and more secure. Here's what you should know.

Content type: Blog Post

Links:

Strategies for Improving VOIP Sales

Hi there! Per your recent idea request, I've spent a great deal of time writing for various VoIP and telecom companies including Edgewater Networks, Mahindra Comviva, and KiZAN. Some of my ideas for this paper include (1.) Going after more local and targeted geos, as big telecoms are saturating the market. (2.) Don't ignore SMBs -- they're a huge market demographic. (3.) To accomplish point 2, invest in a reputation for high QoS -- e.g. by investing in SD-WAN.

Content type: Whitepaper

Links:

Auto Campaign: Understanding In-Cabin Gesture Controls

Knobs and touchscreens are an overt distraction for a driver when trying to navigate. Voice controls don't offer the fidelity necessary for accurate responses. When powered by machine-learning and smart cameras, gesture controls represent the smartest, safest way to enjoy your car. Here's why?

Content type: Blog Post

Links:

'Why Gesture Control Represents the Car of the Future

Cars need gesture controls. As infotainment systems in cars become more elaborate -- think dashboard-sized screens over a meter long -- the means that drivers use to control them need to become simpler. What's simpler than a flick of your wrist? Here's how machine learning and gesture tracking combine to make controlling your car simpler than ever.

Content type: Blog Post

Links:

Rethinking enterprise backup and storage in the microservices era

Microservices, Docker, and Kubernetes have lit the development world on fire. They've also let the storage world on fire, in a more unfortunate way. Microservices tend not to cooperate with traditional block storage, leading to data integrity issues. Backup services, which were designed for VMs, don't know what to do with microservices. Compliance policies don't know how to log containers, which can appear and disappear in seconds. In other words, storage is due for a rethink.

Content type: Whitepaper

Links:

Omnichannel isn't just for Marketers -- It's for the Product Team as Well

Any marketing professional you ask nowadays will tell you how important it is to create a uniform customer experience over every channel you touch. If you ask a product manager, will they say the same thing? Here's how consumer expectations are driving an omnichannel approach from the product management team.

Content type: Blog Post

Links:

China's Supply Chain Hack is a Lesson For the Logistics Industry

Adulteration is a problem in many industries -- pharma & F&F in particular -- but it's a serious concern in IT. A report from Bloomberg recently revealed that Chinese hackers were able to infiltrate the supply chain of a major server manufacturer in order to install components that were used to attack their customers' computer systems. How did this happen -- and how could increased traceability help solve this problem?

Content type: Article

Links:

Is Verizon's 5G Service Really 5G?

Verizon has just claimed to launch the first 5G broadband service in existence -- but is it for real? The answer is an extremely qualified yes. The service is 5G, but it's not on the same 5G standard that the telecom industry will eventually adopt. If you're in an area where the service is offered, is it worth signing up?

Content type: Blog Post

Links:

Microsoft Ending Support for Skype Classic

On November 1st, a newer and more youth-oriented version of Microsoft's Skype platform will finally replace the older version. Early adopters have had some negative things to say about the updates, but the software giant maintains that it's ironed out the kinks. What's new, and will you be happy once you upgrade?

Content type: Blog Post

Links:

Sprint Finally Adopts VoLTE, Clearing the Way for the End of 3G

3G is finally dying. After several years of availability, both Sprint and several other cell carriers have begun to adopt VoLTE, while higher-tier telecoms have begun to dump the 3G spectrum altogether. Here are a few reasons why both consumers and telecom operators should be happy.

Content type: Blog Post

Links:

Glitch Halts Google Plus for Good

Did you ever have a Google Plus account? Neither did we, but a few people did, and most of their information just got leaked in a bug that affected 500,000 people. Let's explore how this happened, and how a little extra security may have helped give the platform a little extra lease on life.

Content type: Blog Post

Links:

What Happens When Compliance Intersects Cryptocurrency?

Cryptocurrency startups are still all the rage these days, but many of these companies have had a "break rules first, settle lawsuits later," approach to operating. Those days are over. How can cryptocurrency startups navigate a world where every major regulatory agency has begun to crack down? Here are a few pointers.

Content type: Blog Post

Links:

What the Supermicro Hardware Hack Tells Us About Security

If you own a Supermicro server, it's possible that your hardware might be compromised at the supply chain level. It's motherboard might be infected with a tiny chip, placed by Chinese intelligence services, that can remotely hack your system and exfiltrate data. How should you respond?

Content type: Blog Post

Links:

The Power-User's Guide to TLS 1.3

It's been years since the last update to the TLS protocol. As this standard is a cornerstone of security across the internet, any changes are extremely noteworthy. Here's why this new update -- with its concept of "perfect forward security" is so important.

Content type: Article

Links:

How Much Content Should You Be Writing? (and how can you write it?)

Research from HubSpot shows that companies who write more blogs get more results. In general, companies who publish over 16 times a month, and have a backlog of over 400 blogs, get about 3.5x more leads. How can you tackle this amount of volume?

Content type: Blog Post

Links:

Best Practices for Developing in a Kubernetes Environment

Kubernetes and microservices have transformed the speed of development, but it's still possible to go too fast. Making mistakes means deploying compromised code, deploying customer PII in insecure locations, or even creating an insecure network. Here's how to avoid those missteps.

Content type: Blog Post

Links:

Kubernetes in Research Applications: Running ROS With Kubernetes

Robot Operating System (ROS) is a powerful set of common instructions used by researchers (and some industries) for creating and running automatons. As it happens, there are some advantages to running ROS in a Kubernetes environment. Namely, it becomes easier to see and debut communications between individual robots or robotic subsystems. Here's how to get ROS running on K8S.

Content type: Blog Post

Links:

Is Marketing Automation Headed for a Crunch?

There are, by anyone's estimation, too many marketing automation services. The number of individual solutions has grown from 5000 to 7000 in just a year. Markets that traditionally approach this level of diversity head for consolidation rapidly thereafter. Is that what we should expect? What does this mean for your own automation initiatives?

Content type: Blog Post

Links:

What Does Kubernetes Development Entail?

Kubernetes is a fast and flexible automation and container management platform that has revolutionized development. With Kubernetes, it's possible to upload code directly from a git repo and put it into production -- just like that. This speed can cause errors, however. Here's how to develop for Kubernetes without exposing your customers to unfinished, buggy, or compromised code.

Content type: Blog Post

Links:

New Bug Affects D-Link Routers -- Only Two Models Get Patches

With the right combination of hardware and bugs, an attacker can get into and control any network based on D-Link routers. This kind of attack can cripple a UCaaS service provider, so it's important to get ahead of it. Unfortunately, several models of D-Link aren't being patched, even though they've been identified as vulnerable. What should service providers do about this?

Content type: Blog Post

Links:

If You're Using a VoIP Gateway Based on LibSSH, It's Time for a Patch

There are easy exploits, and then there are easy exploits. A new vulnerability in LibSSH, a popular encryption protocol, lets users log in simply by sending a message that their login attempt was successful. GnuGK, a popular VoIP gateway service, is among the affected applications. Here's what you need to know.

Content type: Blog Post

Links:

3 Reasons why SD-WAN will be Crucial for 5g

1. In areas of high-density 5G connections, 5G will be supported by small cells 2. These dense networks of small cells will need to be optimized to provide high-speed connections to all users 3. SD-WAN is the best technology to optimize these connections

Content type: Blog Post

Links:

Shodan: The Search Engine for Your Attack Surfaces

One thing that you need to know about attackers is that they will exploit any of your open ports. You may think that all of your open ports are protected by a firewall, but history tells us that's probably not the case. Even a single insecure router may have open ports that lead into your network -- that's why you should use Shodan. Shodan is a search engine that indexes every open port connected to the internet. Here's how you can use it to find your vulnerabilities.

Content type: Blog Post

Links:

Red Team 101: Kali Linux Explained

One of the most important parts of creating a secure organization is creating a red team -- a group designed to weasel out the exploitable vulnerabilities in your network. Step one in this process is often figuring our how to use Kali Linux. For those who don't already know, this is a version of the Linus operating system that's optimized with the tools you need to start probing your own defenses. Here's what those tools are and what they do.

Content type: Blog Post

Links:

Red Team 102: Understanding MetaSploit

I want to build on the first Red Team blog I thought of and create an article around Metaspoit. This is an open source library of exploit commands and applications that's often built into Kali Linux, but can be deployed separately. With both of these red team blogs, I'll circle back to the idea that you can use Safe-T to fix the flaws in your network that you discover through penetration testing.

Content type: Blog Post

Links:

Using the New TLS in a Kubernetes Environment

The latest iteration of TLS enables perfect forward security -- but it can still be imperfectly deployed. The placement of your TLS proxy has huge implications for how much security you'll actually enjoy. Here's where it should go.

Content type: Blog Post

Links:

Three Reasons to Learn about Kali Linux

Ready to start your own Red Team? Every company needs to occasionally probe its own cyber-defenses, and a Red Team is a group of employees that will help you do that. If you want to create your own Red Team from scratch, however, it's best to learn about Kali Linux. This is an entire operating system designed to automatically breach your website, application, and network using simple tools. Kali Linux helps you learn your weak spots, so you can patch them up before a cyberattack.

Content type: Blog Post

Links:

Guide to B2B Micro-Influencers

How can a person with just 1000 followers bring in revenue for your business? Depending on the individual, the 1000-ish people following them might trust this person implicitly based on their expertise in a number of niche topics. In other words, you can work with a micro-influencer to convert a much larger fraction of their audience. Here are a few things you need to know.

Content type: Blog Post

Links:

Use Employee Advocacy to Make Your Voice Heard

When you pursue an employee advocacy strategy, every one of your employees turns into a marketing employee. When each of your employees posts on Facebook, LinkedIn, and Twitter in favor of your company, you can potentially obtain a rate of return much higher than any paid ad -- and you can do it all for free. Here's how to get started.

Content type: Blog Post

Links:

What Does a Smart City Look Like?

The city of the future is both networked and instrumented. Sensors in the water supply help eliminate pathogens, smart card readers let citizens pay for tolls and transportation, and traffic cameras help eliminate congestion. Here's how the world's most forward-thinking cities are helping their citizens lead safer and more convenient lives.

Content type: Blog Post

Links:

Small Business, Big Solar: How Solar SMBs Will Benefit the Environment

Earlier last year, the National Renewable Energy Laboratory (NREL) estimated that if all of the rooftops in the USA were suddenly plated with solar panels, they would be able to generate 1,118 gigawatts of electricity. That's not small potatoes—and much of this energy would come from small, non-residential buildings. This article will talk about why small businesses haven't yet adopted solar en masse, and the good that would come about if they did.

Content type: Blog Post

Links:

New Malware Threats to Watch Out for in March 2017

Malware always gives us wonderful new surprises. Here are some new threats to make you patch your servers and change your passwords in March 2017: 1. A WordPress flaw that lets hackers install backdoors. 2. Fileless Malware, one a tool of nation-states, is in the hands of random criminals. 3. IoT Malware now attacks vending machines

Content type: Blog Post

Links:

Promo blog for Mautic ebook

Some of our clients like to promote their gated content on their blog feed. This essentially consists of re-framing the ebook as a blog, excerpting some of the content, and inviting readers to download. Does that sound like a plan?

Content type: Blog Post

Links:

Telecom DDoS Attacks Surging in 2017

DDoS attacks have surged by 37% in 2017, driven by an increase in botnet activity concerning the Mirai platform. For telecoms, these attacks have the power to cause service outages, preventing users from making calls. In an emergency scenario, this could be literally deadly.

Content type: Blog Post

Links:

3 Times the European Union Pitched out of Touch Data Protection Legislation

The GDPR is coming, and it looks like a pretty big upheaval in the world of information privacy. There have been several times, however, when the EU's attempts to regulate data privacy have been completely out of touch. There's the time when they tried to ban under-16s from social media, the ineffective cookie law, and the antitrust case against Google. The GDPR may seem onerous—but what we could have gotten may be been much, much worse.

Content type: Blog Post

Links:

ERP is Changing Because of the Cloud -- How Should IT Departments Change In Return?

The cloud changes things, and not always in a good way. A recent survey from the security vendor AlgoSec shows that 30% of companies find that their applications don't work as expected after a cloud migration, and ERP is no exception to that rule. ERP customers increasingly find that once their vendors finish porting their applications to the cloud, their legacy on-premise systems begin to break. What is the best path for organizations who need to adapt?

Content type: Blog Post

Links:

The Limitations of SD-WAN

The genius of SD-WAN is that it lets companies prioritize the applications on their network in terms of bandwidth. The limitation of SD-WAN is that it can't make a bad network good. If you're in an area with limited connectivity or if your network is poorly configured, you're going to find that SD-WAN does very little to fix your problems. The solution? You need to marry your SD-WAN to a program of robust analytics.

Content type: Blog Post

Links:

Ensuring Compliance with a Healthcare Blockchain

When it comes to information security, hospitals are leaky places. In Q1 of 2018 alone, 110 healthcare data breaches exposed 1.13 million records. Most of these breaches weren't down to malicious actors -- mostly they involved the accidental mishanding of data. This is an excellent use-case for the blockchain -- everyone who uses the blockchain can see who else has a copy of patient data and where it's stored, and only the patient can authorize data sharing.

Content type: Blog Post

Links:

Use Redis? There's a Good Chance It's Been Co-Opted

75% of public-facing Redis servers have been infected by cryptocurrency mining malware. While this malware doesn't steal data, it slows down your servers, increases your electricity costs, and may act as the prelude to a more wide-ranging data breach. Co-option by malware is a huge risk for public-facing services (see the MongoDB ransomware incident) -- how can administrators mitigate this risk?

Content type: Blog Post

Links:

Auto Campaign: Understanding In-Cabin Gesture Controls

Knobs and touchscreens are an overt distraction for a driver when trying to navigate. Voice controls don't offer the fidelity necessary for accurate responses. When powered by machine-learning and smart cameras, gesture controls represent the smartest, safest way to enjoy your car. Here's why?

Content type: Blog Post

Links:

'Why Gesture Control Represents the Car of the Future

Cars need gesture controls. As infotainment systems in cars become more elaborate -- think dashboard-sized screens over a meter long -- the means that drivers use to control them need to become simpler. What's simpler than a flick of your wrist? Here's how machine learning and gesture tracking combine to make controlling your car simpler than ever.

Content type: Blog Post

Links:

Can You Combine Storage with Autonomy?

What happens if you let storage make its own decisions about what to store? Traditionally, running enterprise applications entails lots of prior configuration in terms of storage, but more advanced systems can be application-centric. This means that they spin up the kind of storage you need based on the application you need to run, without being told in advanced. This is one level of autonomy, but what would an even more advanced system look like?

Content type: Blog Post

Links:

Is the Hybrid Cloud Due for a Resurgence?

Over the last few years, private cloud adoption has steadily dropped -- which means that hybrid cloud adoption has also dropped. Here's why the hybrid cloud model is still worth your interest.

Content type: Blog Post

Links:

5G and the Future of Telecommunications

Keeping in mind that VoltDB is a next-gen database that is pThoughts on content are: * What, exactly, is going to happen to infrastructure if volumes/events go up 10->100X * What happens when ISPs *insist* on full virtualization? * What happens when edge applications - ones that require compute power with 1s / 180 miles of the user - become 'a thing'?

Content type: Blog Post

Links:

Red Team 104: CrackMapExec

What do you do once you've successfully breached your network? You live off the land, moving laterally through a network while escalating your credentials. This would be a good tie-in to Safe-T's zero trust network approach.

Content type: Blog Post

Links:

Just How Easy Is It to Get Phished?

This blog will dissect a phishing attempt -- from selecting a target to sending a malicious word doc. Learn how hacking tools like luckystrike make it easy to generate malicious documents on an almost turnkey basis -- and then understand how Avalon can keep you safe.

Content type: Blog Post

Links:

Converting Small Businesses as an MSP

Small businesses are an ideal market for MSPs. With limited budgets for technology and security, it seems like most SMBs would be happy to offload their IT responsibilities. Here's the stumbling block -- most SMBs don't have a CIO or a director of IT. This means that your content needs to be oriented towards non-technical business leaders. How can you make it work?

Content type: Blog Post

Links:

3 Reasons Why Replacing SMB is Harder Than it Sounds

SMB is insecure, but if you block it, your problems compound. It's harder to send normal messages, and the replacements are difficult to integrate into your workflows. CTA links to Smart Transfer blog.

Content type: Blog Post

Links:

It's Time to Replace SMB with Something Smarter

Original network protocols are starting to age out of usefulness. HTTP is being replaced by HTTPS, people are trying to replace DNS with DNSSEC, and TLS just got its first update in 8 years. Now it's time to update SMB. Introducing SMTR.

Content type: Blog Post

Links:

Hosted PBX Providers -- Can You Avoid Acquisition?

A recent article from NoJitter posits that the hosted pbx industry is due for a wave of consolidation -- but what if you don't want to be consolidated? NoJitter says that acquisition will be the best way for smaller hosted pbx providers to achieve the speed and scale of larger companies, but there are other avenues. Here's how Network Edge Orchestration can help you grow like a big company -- without having to merge.

Content type: Blog Post

Links:

Ransomware Still Quietly Growing

Although the days of massive attacks like WannaCry and NotPetya seem to be behind us, the overall growth in ransomware has continued unabated. Not only has there been a massive spike in ransomware towards the end of 2018, the number of overall ransomware strains continues to diversify. How can companies protect themselves?

Content type: Blog Post

Links:

Creating an API Strategy Around Multi-Cloud

In a multi-cloud strategy, different tools from different vendors are going to need to talk to each other -- and sometimes that won't be possible. Should companies attempt to use third-party integration strategies or attempt to homebrew their own?

Content type: Blog Post

Links:

Why SMBs Need MSPs

Smaller companies may not need as much in terms of actively-managed IT, but they have a lot to gain. Learn how SMBs can use managed service providers to access the digital transformation and out-compete their rivals.

Content type: Blog Post

Links:

Does Multi-Cloud Leave Room for Private or Hybrid Clouds?

Multi-cloud strategies continue to proliferate, but overall hybrid cloud usage is dropping due to the fact that more and more companies are offloading 100% of their on-premise server hardware.Is this position going to stabilize, or are we racing towards a future where the private cloud is irrelevant?

Content type: Blog Post

Links:

Ransomware Still Quietly Growing

Although the days of massive attacks like WannaCry and NotPetya seem to be behind us, the overall growth in ransomware has continued unabated. Not only has there been a massive spike in ransomware towards the end of 2018, the number of overall ransomware strains continues to diversify. How can companies protect themselves?

Content type: Blog Post

Links:

Creating an API Strategy Around Multi-Cloud

In a multi-cloud strategy, different tools from different vendors are going to need to talk to each other -- and sometimes that won't be possible. Should companies attempt to use third-party integration strategies or attempt to homebrew their own?

Content type: Blog Post

Links:

Securing a Multi-Cloud Environment

Security in the cloud isn't like security on-premises. What are the differences, and how can use use the cloud's built-in tools to secure your environment?

Content type: Blog Post

Links:

Will Legal Cannabis in the US Serve as a Model for Israel?

Hi there! I've written extensively on the cannabis industry in the past, and based on your blog request I'd love to send you something about cannabis regulations in the United States and how they may or may not serve as a model for Israel. I've attached a source link with a recent blog I ghostwrote on a similar topic. Let me know what you think!

Content type: Blog Post

Links:

How do Companies Get Started With Multi-Cloud?

There are two ways to get started with multi cloud -- by accident or on purpose. By accident means that people start buying different SaaS products with no roadmap for sharing data between them. On purpose means developing a strategy beforehand. Obviously, having a strategy works best, but how do you rescue yourself if you stumbled into the multi-cloud by accident?

Content type: Blog Post

Links:

(X) Best Ways to Get Started with Multi-Cloud

Let's assume that you're preparing a multi-cloud strategy. From storage to networking, what are the best ways to prepare your infrastructure to move data between multiple clouds?

Content type: Blog Post

Links:

(X) Ways to Boost Your Support KPIs

Your mean time to resolution, your first call resolution percentage, your NPS -- if you're serious about supporting your customers, you monitor these metrics religiously. If you find yourself lagging in any of these areas or more, you may find yourself needing to troubleshoot your own troubleshooting apparatus. Let's look at some ways to do that, such as improving your knowledge base, investing in multichannel, and using RMM software.

Content type: Blog Post

Links:

2019 Edge Computing Trends

In 2019, edge computing is going to become more and more relevant. The limitations and promises of 5G will force more companies to place compute resources at the edge of the network -- which will in turn drive a more federated and inclusive edge.

Content type: Blog Post

Links:

Cloud Providers Jumping into SD-WAN -- Can UCaaS Compete?

Cloud services providers are investing in SD-WAN services, which seems like a natural marriage -- after all, SD-WAN improves access to the cloud. If you're a CSP offering SD-WAN however, you may wonder if you can compete with the likes of Microsoft, AWS, and Oracle. Here are a few ways to lock in your client base before cloud providers can steal your market.

Content type: Blog Post

Links:

Live Captions for Skype Herald AI in VoIP

Microsoft has debuted the power of AI to create live captions for video conferences on Skype. Although this advancement is great for deaf or hearing-impaired individuals, it could also be used as a stealthy means of failover. If the caller is calling from a noisy environment or there's a problem with the audio channel, Skype could swiftly change them over to captions so their communications could still be decipherable. What are some other uses for AI in VoIP?

Content type: Blog Post

Links:

White Paper Copy Edits

Hi Nidhi! I was reading your white paper and I noticed that there were some extant spelling, grammar, and structural issues. Given a short amount of time, I'd be more than happy to edit your paper and improve its overall professionalism. Let me know what you think.

Content type: Blog Post

Links:

Dealing with the New TLS in a Kubernetes Environment

The latest iteration of TLS enables perfect forward security -- but it can still be imperfectly deployed. The placement of your TLS proxy has huge implications for how much security you'll actually enjoy. Here's where it should go.

Content type: Blog Post

Links:

X Reasons why Google isn't a great research tool

Google isn't a search engine technology. Rather, it's a media company with a search engine attached. That means that the results it gives you can sometimes be inflected by cold, hard, economics. Some of the ways in which Google skews search results are obvious, some are less so. Here are three ways that Google makes life difficult for researchers.

Content type: Blog Post

Links:

Telecoms Let 3rd Parties Track Your Phone's Location

According to a widely-publicized story from Motherboard, there's a data leak between your phone and your telecom provider. For just $300, a third-party can exploit this leak to track the user's location in real time. If you're a UCaaS provider, your reputation depends on the integrity of the services you provide -- how can you prevent leaks of a similar nature in your own networks?

Content type: Blog Post

Links:

How SD-WAN Lowers Your TCO

Traditional WAN can cost up to 10% of a company's budget. SD-WAN can slash those costs by allowing companies to purchase wholesale bandwidth, integrate multiple types of connectivity, automate their networks, and use COTS hardware. Let's examine the details.

Content type: Blog Post

Links:

US Ballistic Missile Agency Fails Security Audit

We've written before about how it's difficult for state and government agencies to protect their computers -- how about military agencies? The U.S. Ballistic Missile Defense System just failed an audit of its security procedures -- let's talk about how it failed and how Safe-T could have fixed its problems.

Content type: Blog Post

Links:

Red Team 201: Your First Test

Over the last few weeks, we've explored the different tools that red teams use to test their corporate defenses. Now, let's start to integrate these tools by planning your first exercise.

Content type: Blog Post

Links:

Ransomware Hits Multiple US Newspapers over the Holidays

Over the holiday weekend, all newspapers currently or formerly owned by the Tribune company were subject to attack by Ryuk ransomware. Industry insiders suspect that the attack was not designed to earn money, but rather to suppress media operations. Is ransomware about to be used as a tool to repress free speech?

Content type: Blog Post

Links:

Is Chromium Dominance Bad News for Information Security?

A few short weeks ago, Microsoft announced that it was replacing its flagship browser, Edge, with one based on Chromium -- the rendering engine that powers Google's Chrome. As a result of this move, a staggering proportion of the world's web traffic will now move through a single application -- and thus a single bug in that application could profoundly affect a huge portion of the internet. Is Chrome about to be the most dangerous app on your computer?

Content type: Blog Post

Links:

How Does a Government Shutdown Affect VoIP?

On Thursday, January 3rd, the FCC suspended its operations as part of an ongoing shutdown. This article may be published after the shutdown resolves, but if it doesn't (or if another shutdown happens to strike in the future), then the nation's VoIP and traditional communications may take a bit of a hit. Without regulators to answer the phone, for example, there's no overarching enforcement mechanism to keep track of outages. Here are some other examples of what could happen.

Content type: Blog Post

Links:

The 3 Most Useful Helpdesk KPIs

BIOS provides helpdesk services, so this would be a short blog post that explains the metrics to look for in a top-performing contact center. The implication would be that BIOS provides top-tier helpdesk services that would max out those KPIs.

Content type: Blog Post

Links:

Reducing Data Center Support Costs -- What You Need to Know

Based on the BIOS Assured service, this blog would st down a few ways -- such as increasing utilization, eliminating equipment that's past EOL, and implementing proactive monitoring -- that organizations can reduce support and operational costs in a data center environment.

Content type: Blog Post

Links:

Simplifying the Challenge of Multi-Cloud

More and more companies are relying on a multi-cloud strategy, but integrating data flows from different cloud vendors is a challenge. Here's how BIOSME can solve it.

Content type: Blog Post

Links:

Why SBMs Still Need MSPs

Smaller companies may not need as much in terms of actively-managed IT, but they have a lot to gain. Learn how SMBs can use managed service providers to access the digital transformation and out-compete their rivals.

Content type: Blog Post

Links:

3 Reasons to Explore the MCSA Azure Certification

Microsoft Azure is one of the fastest-growing major cloud platforms, and certified technicians are in short supply. Here's how to pursue the MCSA Azure Certification and seize an advantage.

Content type: Blog Post

Links:

Adding Containers to UCaaS: Can it be Done?

For software developers, containers -- tiny software instances that can run on any kind of server operating system -- represent the future. Containerization platforms such as Docker have taken the world by storm because of their ease of use and scalability. Can this functionality be applied to UCaaS?

Content type: Blog Post

Links:

Skype in the Doctor's Office -- How UC is Transforming Healthcare

Here's one of the little-explored externalities of commonplace streaming video -- remote diagnosis at the doctors office. Doctors are increasingly using services such as SfB to remotely diagnose ailments in situations where patients can't come into the office. How can UCaaS providers take advantage?

Content type: Blog Post

Links:

Will SD-WAN (and SDN) Crowd Out NFV?

While SDN vs. NFV isn't a winner-take-all format war like Betamax vs. VHS, it's clear which form of technology is getting more press. While SDN has a clear advantage in that it mostly isn't tied to appliances, NFV is slowly moving away from that delivery model as well. What will it take for NFV to break through in 2019?

Content type: Blog Post

Links:

Your First Vulnerability Scan -- What You Need to Know

This will go over the common tools and procedures used in a vulnerability scan, alongside what makes it distinct from a penetration test. Tie-in with BIOS Secured.

Content type: Blog Post

Links:

How Long Does Failover Take? A Short Guide to Ideal Disaster Recovery

Quick discussion of basic concerns for dealing with and setting up disaster recovery -- plus what could happen if it's not set up correctly.

Content type: Blog Post

Links:

How AI is Transforming Small Business (Response to Pitch Request)

So, I see three main branches to the resulting article. Branch 1 is customer experience -- doing things like sentiment analysis, monitoring trends, finding gaps in the business logic. Branch 2 is responsiveness -- things like the ability to put an AI chatbot on your homepage or support page. I will then make the argument that these outwardly-facing augmentations obscure an important fact: before you compete based on CX, you need to have a strong foundation, hence branch 3: Botkeeper

Content type: Blog Post

Links:

Eliminating Volatility in Cryptocurrency Means Eliminating Information Asymmetry

In 2017-2018, crypto experienced a problem with bad actors. Now, in order for crypto companies to be perceived as credible and comply with new regulations, they must disclose information about their finances. The more information that investors have (within reason), the more wisely they can invest. This article will round up projects -- such as Messari, Balanc3, and Interchange -- that help crypto companies responsibly share investment data.

Content type: Blog Post

Links:

Where Telehealth Meets Compliance

Hospitals and small practices are increasing their telehealth adoption, but as with many technological developments, regulatory measures are behind the curve. How do you take privacy laws that were meant to apply to in-person visits and adapt them for video calls?

Content type: Blog Post

Links:

Videoconference Bug Lets Users Eavesdrop on Phones

Apple's FaceTime app has a serious issue -- it lets callers listen in to recipients' microphones, even if the recipient hasn't picked up the call. If this is an issue for one of the largest companies on Earth, what does it say about the security of your own videoconferencing app? Tie in to EWN's videoconferencing security effort.

Content type: Blog Post

Links:

New SIP Trunking Survey Says Tech Has Yet to Meet Expectations

For the Nth straight year in a row, the industry survey shows that SIP trunking providers still aren't providing service that satisfies customers. This year, the survey shows a broad divide between customer expectations and provider's perception thereof. In other words, providers seem to be broadly unaware of what their customers want.

Content type: Blog Post

Links:

Finding a Place for the Private Cloud in a Hybrid World

Private cloud usage has been dropping, but it might have just found a floor. Although there's a lot that the cloud can do, there are many core enterprise functions that companies only trust on-premises. This will tie in to Private Cloud HPT.

Content type: Blog Post

Links:

Kubernetes, containers, and other cloud amenities explained

A short primer on some of the more popular technologies currently running on top of public and private clouds. The takeaway is that if you build and maintain the software, BIOSME will help run the infrastructure.

Content type: Blog Post

Links:

Explaining the shared responsibility for security in the cloud

A lot of customers don't know how security works in the cloud, and how responsibilities are divided between cloud providers and their customers. This article will explain that. The takeaway: "if shared responsibility sounds difficult, ask about BIOS Secured."

Content type: Blog Post

Links:

Why do you need a local datacenter?

A short article talking about how low costs and low latency makes local and regional data centers into an attractive option for businesses of any size.

Content type: Blog Post

Links:

7 Reasons to Dump Windows 7 Before it Goes EOL

For a lot of software, EOL is not the end -- just ask everyone who's still running Windows XP. Still, there are operating systems and there are operating systems. Windows XP may have some unreasonable staying power, but Windows 7 is going EOL next year -- does it deserve the same unnatural longevity? Here's why we think not.

Content type: Blog Post

Links:

How to scale your marketing across branch offices

In this blog, I’m going to talk about spreading marketing automation in terms of a cultural challenge. Why would you want to let branch offices control their marketing efforts? When does this become more practical than controlling everything from the home office? How do you avoid brand dilution?

Content type: Blog Post

Links:

Tuning your marketing campaigns for different regions

When you have franchises or branch offices in different regions, you may want to be able to customize your marketing to reflect the values of those areas. What goals should you set for yourself when customize your marketing approaches in a different region than where you’re located?

Content type: Blog Post

Links:

Push Notifications, Not SMS, are the Future of MFA

When it comes to multi-factor authentication, text messages have been shown to be unreliable. Real-world cyberattacks have already exploited an ability to intercept one-time-passwords when sent via SMS. Are push-notifications the most user-friendly alternative?

Content type: Blog Post

Links:

Vulnerability Scanning -- Getting Started with Metasploit

When it comes to scanning your network and applications for vulnerabilities, Metasploit is a gold standard. Open-source, easy-to-use, and well-supported, this program can do a deep dive into your network for vulnerabilities you may have never considered. Here's how to get this program up and running.

Content type: Blog Post

Links:

Solving the STEM shortage in manufacturing

Manufacturing has a big problem. It's not necessarily that there aren't enough STEM majors (although there aren't) it's that most of these majors are now going to venture-funded startups as opposed to manufacturing concerns. Manufacturing can make up the shortfall by using powerful artificial intelligence tools to augment its skilled workforce.

Content type: Blog Post

Links:

2019 Rightscale Survey Shows Enterprises Concerned about Cloud Costs

Public cloud spending is increasing among enterprises, but lowering cloud costs remains the top concern for the third year in row. In addition, companies continue to underestimate the amount of cloud spend they waste. How can companies reconcile the amount of money that they're wasting with the desire to increase their savings?

Content type: Blog Post

Links:

How to Cope with the End of Windows 7

Windows 7 is going end of life in just over a year -- but it's projected to have more leftover unsupported users than Windows XP did when support ended for it in 2014. With this operating system poised to become a legacy product in many offices, how can current users cope with the coming shutdown of support?

Content type: Blog Post

Links:

Recapping the 2019 State of the Cloud Report

Rightscale recently released its 2019 state of the cloud report. This much-anticipated document shows that more enterprises than ever are adopting a multi-cloud strategy.

Content type: Blog Post

Links:

Mapping the Spread of Connected Products

By 2020, 47% of all products will be able to connect themselves to a wireless network. In some ways, this proliferation is comparable to the spread of electrified products in the late 19th Century: beginning with industrial applications, and then spreading to consumer goods. Electrified products eventually became safe, reliable, and practical -- will IoT products be the same?

Content type: Blog Post

Links:

Centering Security in Kubernetes

K8s has been out for just 4 years now -- so it's safe to say that the platform's security posture still has room to evolve. The platform has only just recently received support for TLS! With security taking a back bench in K8s, the result is a platform with few built-in network security controls , and inconsistent controls across environments. How can administrators build security into the platform?

Content type: Blog Post

Links:

Do You Have a Pain in Your AS/400?

Since 1988, the AS/400 has been a workhorse of manufacturing companies -- but unfortunately, that's more by accident than design. These antiquated systems are difficult to replace, because when you try to rip them out, they break every system that depends on them. Fortunately, software companies have come up with ingenious API strategies so that companies can cleanly lift their AS/400 systems into the modern era.

Content type: Blog Post

Links:

Avast Review

Hi Paul! Thanks once again for the assignment. I feel confident that I'll be able to get this turned around for you by Friday, plus three additional blogs. Talk to you soon!

Content type: Article

Links:

Hackers Accessed Microsoft Accounts

Hackers were able to compromise Microsoft's Azure-supported cloud email service and access user information for nearly two months. Microsoft has let down its side of the shared responsibility model -- what will be the consequences?

Content type: Blog Post

Links:

Data Center Growth Continues

AFCOM has recently released its annual study of the state of the data center, and demand remains strong. The average organization now operates 12 data centers -- and that number is projected to grow to 17 by 2022. How is this demand affecting the cloud marketplace?

Content type: Blog Post

Links:

Azure Right-Sizing Eliminates Unnecessary Cloud Spend

Imagine spending hundreds of dollars on a server and then doing nothing with it. Or purchasing an application for many times that amount, only to find that it doesn't do what you want. No refunds. This scenario happens in the cloud every day, with up to 35% of cloud spend simply vanishing into thin air. Here's how to use Azure to make sure you don't spend money on resources you don't need.

Content type: Blog Post

Links:

Webroot review

Per emails

Content type: Article

Links:

Exposed Endpoints

Are your computers and servers discoverable from the internet? Then they're vulnerable. Attackers can do a great deal of damage using only your computer's IP address. Here's how you're vulnerable and how to protect yourself.

Content type: Blog Post

Links:

7 Deadly Sins of Cloud Migration

1. Blindly "Lift and Shift" without considering more efficient architectures 2. Failing to modify security at you move to the cloud 3. Ignoring shared responsibility etc. etc.

Content type: Blog Post

Links:

Zoom Bug Highlights Need for Videoconferencing Security

So, the Zoom bug was bad, but it's technically fixed -- patched out by a stealth MacOS update. However, it highlights a need to secure videoconferencing environments. This doesn't just include software security (I'll highlight methods though, including WireTap), but also the physical environment. There shouldn't be anything in range of a videoconferencing camera that could give away corporate information.

Content type: Blog Post

Links:

Recommendations

Fantastic Cybersecurity Writer

Andrew is one of the few writers I've met who can write very-niche cybersecurity articles while making them digestible to mere mortals like myself. He knows the industry so well that I end up going to him with more questions than he probably cares to answer but always does so with a smile.

Matt Solar, nDash.co

Great writer and technical storyteller

I genuinely look forward to seeing Andrew's drafts arrive in my inbox. I'm a big fan of his work! B2B tech is often said to be a boring space, but you could never tell that by reading Andrew's content. He's got a great knack for crafting compelling narratives to draw readers in, while also appealing to the most technical types of audiences.

Michael Brown, nDash.co

Great writer, technical storyteller

I genuinely look forward to seeing Andrew drafts arrive in my inbox. I'm a big fan of his work! B2B tech is often said to be a boring space, but you could never tell that by reading Andrew's content. He's got a great knack for crafting compelling narratives to draw readers in, while also appealing to the most technical types of audiences.

Michael Brown, nDash.co

Content Available for Purchase

It’s almost too easy to sell information security products by appealing to fear, but it doesn't always work best. This piece explores some alternative approaches that could yield greater marketing results, and position your brand in a more positive light.