Over the past couple of decades, since the birth of the web, automation of business processes has progressed at an exponential rate. Responding to public demand for services to be immediately available has been the difference between businesses thriving, or shutting down. One of the latest tools in the drive for organizations to automate and improve has been the recent impacts of machine learning techniques, known collectively (if incorrectly) as “Artificial Intelligence” or AI.more →
In Fujitsu’s global survey of consumer attitudes, 88% of people say they are worried about who has access to their data. It seems that you are not alone in your concerns about data privacy. With the inexorable rise of cloud service adoption over recent years, cloud systems and eco-systems of numerous cloud service providers are proving notoriously hard to secure.more →
A WAF, standing for a Web Application Firewall, serves the purpose of protecting one or more web applications from being breached. They are widely deployed amongst businesses to help keep company records and customer information secure. Gartner notes that customers characterised WAFs as regularly being ‘frustrating’ and ‘a disappointment’. As the web becomes more complex, it’s becoming increasingly difficult for hardware vendors to meet existing and evolving requirements, such as moving web applications to cloud infrastructure (IaaS).more →
Are SD-WANs a real benefit for businesses?
Ten years ago, WANs based on MPLS were sold on the basis of saving customers from the complexity of Internet VPNs. Network providers promised simplicity, security, agility, and efficiency. Today, WANs based on Software-Defined Networking techniques (SD-WANs) are being promoted as being able to solve the inherent complexity in MPLS networks.more →
In the previous article in this series, we looked at the business case for DDoS (Distributed Denial of Service) testing. If you read this last post, you will probably agree that there are a number of features of DDoS attacks and DDoS mitigation systems that make DDoS attack testing particularly important.more →
Why conduct a DDoS Test?
Historically, security specialists have never placed DDoS testing high on the IT agenda, relying mainly on vulnerability assessment and penetration testing as a means of security validation. However, things are changing. DDoS attacks are no longer simply a risk to the availability of an IT system or service.more →
DDoS, or Distributed Denial of Service, creates a risk for businesses that conduct any transactions using public Internet services. The severity of the risk will, of course, depend on how much that business relies on its online systems for revenue. If the risk is sufficiently large, then budget is usually set aside for mitigation.more →
In part 1 of this blog series, I introduced the concept of unleashing the potential of teams. Working collectively on a task can boost performance significantly. And as teams become more distributed in the modern workforce, collaboration is the number one factor that companies need to implement.
In this article, I explore some of the collaboration products and technologies available and discuss what businesses are doing to drive change.more →