Blog
Discover what’s new
Our latest thought pieces

The 3 Biggest Challenges of Colocation (And How to Overcome Them)
If you need significant computing power but aren’t interested in maintaining your own data center, colocation is an excellent option. However, there are drawbacks and challenges to this approach as well. Here’s how to overcome some of the most significant.

How Empathy Will Make You a Better Sysadmin
The stereotypical sysadmin is not what you would describe as a people person. They tend to prefer the company of software and computer systems to that of people. This is a stereotype that needs to end. The first step? Learning to consider the needs of others.

3 Reasons to Incorporate DevOps in the Data Center
DevOps as a concept has existed in the information technology space for some time. However, where the data center is concerned, it’s still relatively untrodden ground. Let’s discuss that value, and why you should incorporate DevOps into your own data center.

3 Takeaways From the Wawa Data Breach
Echoing incidents like Target and Home Depot, convenience store chain Wawa saw the theft of tens of millions of payment cards via malware installed in its point of sale system. It’s a familiar story, yet still, one that has many lessons to teach.

Las Vegas Just Avoided a Devastating Cyberattack. Here’s What You Can Learn From Their Example
At last, some good news on the cybersecurity front. On Jan. 7, Las Vegas was the target of what could have been a devastating cyberattack. Unlike other cities, however, Vegas was not caught unaware. Instead, it detected the intrusion, avoiding what would have otherwise been a major crisis. Here’s what you need to know to follow their example.

What We Can Learn From the New Orleans Ransomware Attack
Ransomware attacks against municipal governments continued in force last month, as four U.S. cities found themselves at the mercy of hackers: New Orleans, Louisiana; Pensacola, Florida; Galt, California; and St. Lucie, Florida. It’s unclear at this point if the four attacks are connected. All we know for sure is that they won’t be the last and that it’s imperative we learn as much from them as possible.

Why We Should All Be Paying Attention to the FBI’s Cybersecurity Recommendations for IoT
In a weekly tech advice column, the FBI provided a list of recommendations for people seeking to protect themselves against the inherent cybersecurity risks of the Internet of Things. This advice isn’t just valuable for consumers. Rather, it’s something that every business in every industry should follow.

How to Protect Edge Computing Against Cyberattacks
As the Internet of Things becomes more widespread, the amount of data it produces increases exponentially. As that happens, it becomes both cumbersome and inefficient to rely on centralized servers and platforms. Instead, computing increasingly must be done at the edge. However, this comes with its own set of cybersecurity concerns and challenges.

Canon Medical’s Gateway Platinum Is A Good First Step For Healthcare Cybersecurity
Canon Medical Systems – one of the leading manufacturers of diagnostic medical hardware in the United States – has unveiled a new cybersecurity solution intended to help healthcare providers tackle the ongoing challenge of protecting patient data. It’s a step in the right direction – and one which medical organizations looking to improve their security posture should take note of.