Out of all the cat videos you could watch, how do you decide which one to view first? The beauty of social media is its real-time, democratic operation. Everyone gets to vote and the content with the most shares is the People’s Choice, rightfully ‘The Best’. But we now know this Facebook-era notion of ‘most popular equals best’ is open to abuse.
When Old News is More Dangerous than Fake News: Vulnerability Scan Blind Spots
Oct 21, 2020 12:02:21 PM / by
Mark Kedgley
5 Key Processes & Controls to Maximize Cybersecurity Effectiveness
Oct 13, 2020 10:32:45 AM / by
Spartak Goskolli
As of late, cybersecurity has come to the forefront of the I.T. Industry, and is one of the key functions of any organization. This article will discuss 5 key processes and potential controls you should implement in order to maximize the effectiveness of your cybersecurity efforts, leading to an all-around secure environment.
Change Management's 'Dirty Little Secret'
Oct 8, 2020 1:50:15 PM / by
Mark Kedgley
Securing Digital Transformation in the New Normal
Sep 21, 2020 3:01:47 PM / by
Mark Kedgley
Change and Configuration Management Best Practices Guide
Jul 21, 2020 10:52:10 AM / by
Denis Goskolli
Systems are constantly changing. Change and configuration management best practices allow organizations to keep track of configuration changes in a way that allows for rapid feature updates without any service outages, but many organizations struggle to find the ideal formula to make this process successful.