Tags

Networking

If You Haven’t Done a Cloud Readiness Assessment Lately, You’re Not Ready for What’s Next

I just returned from Collaborate 18 in Las Vegas, which, for those of who aren’t familiar with it, is the annual Oracle User’s Group meeting. They had thousands of attendees again this year and had some great presenters including our own Sridahr Avantsa, Kevin Gilpin and Mike Messina, who talked about moving to the cloud and updating to Oracle 12C.

Read More…

Locking Down the Endpoint

The most common second step of any security breach is the exploit of a security vulnerability in a platform or application. Today, that includes not just PCs and Mac, but a whole host of mobile devices, and all the systems sitting in our datacenters, the cloud, and the Internet at large.

Read More…

Moats, Walls, Threats, Networks

Who’s in your network? The adversaries are already past the gate. One third of US companies were breached in 2016, and even more don’t yet know that they have already been breached. The amount of time-to-discover that a breach has happened is measured in weeks and months when the time-to-compromise defenses is measured in minutes. The moats and walls of yesteryear aren’t keeping us safe from the adversary anymore.

Read More…