Our Blog
Home / Blog

5G-Enabled Edges Require the Network and Security to Converge
Digital innovation, work-from-home, the Internet of Things, and other macro-trends have forced nearly every organization to redesign their networks to provide better business outcomes and user experiences. The so-called network perimeter, which was once a narrow point...

Microsoft Exchange exploits – step one in ransomware chain
Once attackers gain a foothold on web servers, there are all manner of nasty tricks and malware they can leverage immediately or put into play later – like ransomware.Since the research blogpost – Exchange servers under siege from at least 10 APT groups – ESET has...

Ransomware in a virtual environment
Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware. Although it significantly reduces some cyberthreat risks, virtualization is no more a panacea than any single other practice. A ransomware attack can still...

4 Horrible Mistakes You’re Making with It Asset Management
A good IT asset manager is great at demonstrating the value the IT department provides to the organization as a whole. Effective IT asset management (ITAM) enables the IT department to make smarter decisions by optimizing equipment and creating positive forward...

When good intentions, good will and sincerity lead to licensing nightmares and financial waste
Working for 20 years in SAM, I have come to the conclusion that the best efforts from everybody to reach high performance of IT infrastructure and fair licensing rules leads to incredible complexity in SAM, stress for SAM teams and over spend in licenses. Licensing...