Craig Badrick

What’s New in Networking

Read More

4 min read

Pensando is Transforming Switching Architecture. That’s a Good Thing.

Pensando’s distributed services switching architecture is changing the game for the better. Learn more about Pensando and all the benefits it brings.

Read More

3 min read

Should We Trust AI with Our Cybersecurity in 2023?

Cybersecurity and AI are becoming ever more entwined as both technologies advance, but how much trust should we place in AI to protect our systems...

Read More

5 min read

The Supply Chain: A 2022 Recap and Tips for 2023

Supply chain disruptions and delays have impacted businesses in the IT sector for the last several years, and it looks like those issues will...

Read More

4 min read

The Many Benefits of SD-WAN

SD-WAN offers many benefits, including improved performance, lower costs, and increased visibility. Discover how you can take advantage of it to...

Read More

4 min read

The Relentless Rise of Advanced Cyberattacks

Two recently discovered cyberattacks serve as a jarring reminder that these attacks are becoming increasingly frequent and advanced, making proper...

Read More

4 min read

Could Supply Chain Bottlenecks in the IT Sector Continue Beyond 2022?

Supply chain shortages have had a major impact on the IT sector. Halfway through 2022, the questions remain: What does the future look like and what...

Read More

3 min read

Bringing Networking and Security Under One Roof with SASE

With remote work on the rise, SASE has emerged as the latest enterprise-grade cloud architecture that bolsters network security, drives down...

Read More

2 min read

What Logistics Organizations Can Do to Improve Processes Amidst Increased Demand

As global supply chain bottlenecks persist, optimizing the controllables has never mattered more. Here are five process improvements warehouses are...

Read More

3 min read

The Importance of Creating a Security Culture

Your organization’s security culture can be the difference between staying safe or remaining vulnerable to cybersecurity threats. Prioritize your...

Read More

3 min read

How HPE GreenLake’s Consumption Model is Transforming Networks

With HPE GreenLake, the latest innovation in as-a-service solutions has arrived. Find out how the groundbreaking consumption model can make your life...

Read More

3 min read

What Is the Cyber Score?

Cyber scores may become more common in the coming years. Find out what they measure and what benefits (and potential risks) they present.

Read More

4 min read

Cloud vs SimpliVity vs Nimble

The cloud may once have been the best choice for storage, but hyperconverged infrastructure is quickly becoming the frontrunner in the space. Learn...

Read More

4 min read

An IT Expert’s Guide to Cryptocurrency

For the past several years, everyone has been talking about the power of blockchain and the potential of cryptocurrency. But what do those terms...

Read More

3 min read

Understanding the Current Chip Shortage

A recent spike in demand and lack of supply has caused a semiconductor chip shortage. Learn about the causes — and the unexpected silver lining.

Read More

4 min read

What is SD-WAN and How Can It Help Your Business?

SD-WAN is helping businesses improve performance and security by transforming the way users connect to applications.

Read More

5 min read

The Argument Against Zero Trust: Is It Valid?

You may come across skeptics of the Zero Trust model who argue that it’s an impractical solution. But do the negatives truly outweigh the positives?

Read More

4 min read

How Large Public Venues Can Prep for Incoming Crowds

As the world starts to look a little more like normal, large public venues need to prepare for the return of crowds. That means strengthening their...

Read More

3 min read

How IT Solutions Can Help Combat Brain Drain

The right IT solutions can help slow or even reverse brain drain while enabling businesses to thrive post-pandemic.

Read More

4 min read

Is Your School’s Network Ready to Return to Full Student Capacity?

With some states announcing plans for full in-person learning this fall, it’s time for schools to consider whether their networks and technologies...

Read More

3 min read

What We Can Learn from the Attempted Attack on a Florida Water Treatment Plant

A failed attempt to poison the water at a Florida treatment plant serves as a jarring reminder of the dangers of weak cybersecurity.

Read More

3 min read

The Automation Problem: As Tools and Systems Become Smarter, Will They Replace the IT Workforce?

Are robots really coming to take your job? Probably not. In fact, AI and automation offer a lot of advantages that can help businesses and workers...

Read More

3 min read

The State of Women in Tech

Women represent untapped potential when it comes to fields like IT and cybersecurity — but how should businesses go about bringing women in and...

Read More

3 min read

The Cybersecurity Skills Shortage Continues to Worsen

An increasing number of cyber threats are exacerbated by the worsening cybersecurity skills shortage. Managed IT services are the solution.

Read More

3 min read

Why Your Smart Cameras Could Be Your Biggest Security Risk

Security cameras are designed to keep your business safe — but what if they’re actually making you vulnerable to cyber attacks?

Read More

3 min read

How Aruba ESP Helps Your Business Gain a Competitive Advantage at the Edge

Aruba ESP helps businesses get ahead of the competition by enabling rapid and powerful data insights at the edge — without sacrificing security in...

Read More

3 min read

How the COVID-19 Pandemic Has Changed Cybersecurity Priorities

A recent report by the Enterprise Strategy Group shows just how much IT professionals must work to keep up with the shifting cybersecurity challenges...

Read More

3 min read

Optimizing the Edge With Aruba ESP

The future of networking is at the edge. AI-powered platform Aruba ESP can help you optimize edge computing while maintaining enterprise-grade...

Read More

2 min read

Announcing Our Partnership with Verkada

Our new partnership with Verkada is bringing powerful, intuitive security solutions to our customers.

Read More

3 min read

The Five Types of Insider Threats to Look Out For

Insider threats can be just as damaging as external attacks. Knowing how to identify and prevent these attacks is critical for organizations of all...

Read More

3 min read

Building an Incident Response Plan

An incident response plan is the best way for an organization to mitigate damage and stay protected in the event of a successful cyber attack....

Read More

3 min read

Active Ransomware Attack Targets US School Districts

Cybercriminals have learned that schools are prime targets for ransomware attacks — don’t let your school be the next victim. Cyber threats are a...

Read More

3 min read

The Role of Network Security Analytics

Security analytics leverage principles of big data to improve security — both physical security and network security. In a recent article, we wrote...

Read More

3 min read

What is a Service Mesh?

A microservices architecture can offer enterprises a number of benefits, but without a service mesh, IT teams will be unable to mitigate a slew of...

Read More

2 min read

Data Protection in the Era of Virtual Computing: How HPE SimpliVity Can Help the IT Teams of the Future

With SimpliVity hyperconverged infrastructure, Hewlett Packard Enterprise (HPE) simplifies the process of enterprise data protection and backups....

Read More

3 min read

IT Infrastructure in the Coworking Era

With open office plans, task-based layouts, high turnover, and diverse tenant rosters, coworking spaces represent some of the most challenging...

Read More

3 min read

How Facebook’s New Cryptocurrency Affects Your Cybersecurity

With Libra, Facebook has taken the latest step in making cryptocurrency more ubiquitous, and now your enterprise data is more valuable to hackers...

Read More

3 min read

Why a Zero Trust Architecture Could Solve Your Cybersecurity Problems

A new generation of cybersecurity threats requires a new cybersecurity strategy: Zero Trust security. Enterprise investment in cybersecurity may be...

Read More

3 min read

What is a Microservices Architecture?

For enterprises in the process of building proprietary applications, committing to a microservices architecture offers strategic benefits that are...

Read More

3 min read

Identifying the Four Main Threat Actor Types

In order to develop best practices for threat intelligence, enterprises must be aware of the four most common types of primary threat actors. In...

Read More

3 min read

What Is The Difference Between WiFi 5 and WiFi 6?

As enterprises look for advanced networking technology to support their evolving needs, WiFi 6 offers a host of game-changing improvements over its...

Read More

4 min read

What is the Building Internet of Things (BIoT)?

The Building Internet of Things (BIoT) promises cost reductions, efficiency gains, and transformational capabilities, but enterprises will need...

Read More

3 min read

Top 5 Challenges of Managing IoT Networks

Running a successful IoT network can provide numerous benefits and efficiencies for your enterprise, but also comes with a number of challenges. For...

Read More

3 min read

What A Smart Building Looks Like

Smart building technology can cut maintenance costs, streamline operations, and offer a better experience for residents and workers — but only with...

Read More

3 min read

What Is Neuromorphic Computing and How Could It Impact Enterprise IT?

Neuromorphic computing uses analog circuitry to mimic the way the human brain processes information. Recent progress in the field could have a major...

Read More

3 min read

Will Blockchain Make an Impact in the Enterprise?

No longer synonymous with cryptocurrencies like Bitcoin alone, blockchain is being tapped by enterprises to fill gaps across a range of IT...

Read More

4 min read

From Stuxnet to Industroyer: The Biggest Hacks in the History of the Industrial IoT

From Stuxnet to Industroyer, here’s what history’s biggest IIoT hacks can teach us about cybersecurity in the Industrial Internet of Things. Because...

Read More

4 min read

Does AI Need Blockchain?

Blockchain and artificial intelligence are both highly-touted emerging technologies, but for the enterprise, they might not intersect as well as...

Read More

4 min read

How Can Enterprises Tackle the IT Skills Shortage?

Here are some strategies that enterprises can implement to better staff, upskill, and improve their IT departments. As big businesses increasingly...

Read More

3 min read

How Operational Technology and Cybersecurity Intersect

While bringing operational technology online promises to transform the industrial sector, key stakeholders need to prioritize cybersecurity practices...

Read More

3 min read

WiFi 6 Is Coming and Enterprises Need to Think About Cabling

WiFi 6 promises to improve wireless speeds, but obsolete cabling could place a bottleneck on your network. WiFi 6 — previously known as 802.11ax — is...

Read More

3 min read

The 5 Most Common Problems with Hospital Networks

Hospital networks are struggling to keep up with cybersecurity, HIPAA regulations, data management, and more. As the healthcare industry shifts its...

Read More

2 min read

From Proactive to Predictive: How Network Analytics Are Revolutionizing Network Performance Monitoring

Predictive network analytics are helping enterprises optimize their networks, anticipate capacity requirements, and forecast future needs more...

Read More

2 min read

The Top 5 Benefits of SD-WAN

No longer just a buzzworthy emerging technology, investment in SD-WAN is expected to see major growth in the coming years. These are the five...

Read More

3 min read

IoT Connectivity Options Compared

The IoT is a broad and complex technology, which means there’s no default, out-of-the-box IoT solution that will be right-fit for every enterprise....

Read More

3 min read

Predictive Network Analytics — Not Just for Data Centers Anymore

With powerful predictive analytics tools, enterprises can now leverage historical data to prevent network problems before they occur. Enterprises...

Read More

2 min read

IT Staffing Problems Holding Back the Accelerating Digitization of Healthcare

As the healthcare industry embraces rapid digitization, the pressure is on to solve IT staffing shortages that organizations can ill afford to...

Read More

VIDEO: School Security Systems — What’s Now and What’s Next?

Stay on top of the latest advancements in school security technology. With the unfortunate rise in school shootings over the past two decades,...

Read More

4 min read

What CTOs Can Do to Get IT and OT on the Same Page

With the emergence of the Industrial Internet of Things comes increasing demand for collaboration between IT and OT, meaning convergence is on the...

Read More

4 min read

New and Emerging Trends in Lone Worker Protection

As innovative workplace strategies allow fewer employees to handle greater responsibilities, employers have a responsibility to protect their workers...

Read More

2 min read

Back to Basics: Single-Pair Ethernet Cabling Is the Future (Again)

The proliferation of IoT devices has spurred a new approach to Ethernet cabling that balances cutting-edge innovation with a tried-and-tested...

Read More

3 min read

What Is Data Gravity?

This simple concept helps explain the rise of cloud and edge computing within the era of big data. Data gravity is a term coined by GE Engineer Dave...

Read More

4 min read

From AIOps to the AIoT: Artificial Intelligence Will Run The World

To manage complex networks and rapidly expanding IoT networks, IT teams will have to turn to the power of artificial intelligence. For IT...

Read More

4 min read

Network Management at the Edge: New Solutions Will Take Edge Computing to the Next Level

Network management tools designed to command the ever-expanding web of assets at the network’s edge will make the new computing paradigm more...

Read More

3 min read

What Comes After Hyper-converged Infrastructure?

Hyper-converged infrastructure has helped enterprises develop more efficient IT practices, but industry experts are already envisioning the next...

Read More

2 min read

How WiFi 6 and 5G Will Work Together to Transform Enterprise Connectivity

Investing in the best network for your enterprise depends on understanding how the future of wireless connectivity will affect your business. For...

Read More

3 min read

The Best Uses for Edge Computing

While edge computing isn’t a one-size-fits-all solution for every business, the companies and organizations that know how to capitalize on its...

Read More

4 min read

Best Practices in IoMT Security

The Internet of Medical Things (IoMT) is fast becoming essential throughout the healthcare industry — but these smart devices can pose major security...

Read More

3 min read

Defending Against Port Scan Attacks

Port scan attacks, though unsophisticated and often harmless in and of themselves, are worth defending — and can be turned against cybercriminals...

Read More

4 min read

The Ultimate (Forward-Looking) Enterprise IT Security Checklist

Building a secure network for your enterprise means evaluating your vulnerabilities now — and understanding where your risks will come from in the...

Read More

3 min read

Overcoming the Challenges of Transitioning to SD-WAN

Industry experts promise that SD-WAN will transform how enterprises do business, manage their networks, and secure their data — but it isn’t without...

Read More

3 min read

AIOps Will Not Replace Your IT Team

AIOps is a powerful tool, and although it will require enterprises to acquire new skill sets and remodel their IT teams, it won’t replace human...

Read More

3 min read

Attacking the Attackers: How Deception Technology Gives Cybersecurity Pros the Upper Hand

Conventional wisdom suggests hackers have the upper hand in the war for cyber-supremacy, but deception technology has the potential to tip the odds...

Read More

3 min read

Successful CISOs Do These Five Things

CISOs bring their niche expertise to bear on organizational data security — all on limited budgets and under mounting pressure. What are the best...

Read More

3 min read

Universities Can’t Upgrade Networks Fast Enough as Collegiate eSports Take Off

University IT departments must take steps to bolster their campus networks as collegiate eSports become increasingly popular. On October 19, 2014,...

Read More

3 min read

How Today’s Cutting-Edge Smart Factories Are Transforming Global Industry

Smart factories bring sophisticated network solutions to bear on systemic industrial inefficiencies. With the right tools, they can help your...

Read More

4 min read

How to Develop a Best-In-Class Data Backup Strategy

Investing in data backup strategy requires more than just capital investment. Enterprises must carefully consider the unique specifications of their...

Read More

2 min read

Can Edge Computing Succeed in the Classroom?

The decentralization of data towards the “edge” of the cloud is on the rise thanks to developments like the IoT and the increasing number of...

Read More

3 min read

How Edge Computing & the IoT Can Help Organizations Make Better (and Faster) Decisions

To achieve maximal efficiency, businesses must process and analyze data in near-real-time — to do that, they need edge computing. As any business...

Read More

3 min read

Considering Hyper-converged Infrastructure? Ask Yourself These Three Questions

As hyper-converged IT infrastructures become increasingly mainstream, enterprises must brush up on the approach lest they fall behind industry...

Read More

2 min read

Preparing the Enterprise for Digital Twin Technology

Merging the physical and digital worlds, digital twin technology has the potential to transform the enterprise. As a result of the growing ubiquity...

Read More

3 min read

The State of Fog Computing

By combining the power of edge computing with the flexibility of the cloud, fog computing has the potential to boost the efficiency of IT operations...

Read More

2 min read

Recent Uptick in Mass Shootings Highlights Need for Better Physical Security Solutions

The growing threat of mass shootings highlights the need for better security measures. In just the second half of September, mass workplace shootings...

Read More

2 min read

What Can the Internet of Things Do for the Enterprise?

The IoT has the potential to transform the way we do business, but enterprises need to ensure their infrastructure is prepared to capitalize on the...

Read More

3 min read

How to Choose the Right Network Monitoring Tool for Your Business

When it comes to the health of your enterprise’s digital infrastructure, choosing the right network monitoring tool can make all the difference....

Read More

2 min read

How Cybercriminals Use Your IoT Devices

Recent warnings from multiple government agencies have underscored the massive cybersecurity liability that unsecured IoT devices present. At the...

Read More

3 min read

How Blockchain Could Transform Healthcare IT

Blockchain technology has paradigm-shifting potential in the healthcare IT space, but questions remain as to how soon this potential will be...

Read More

3 min read

5 Tips for Effectively Managing BYOD in the Enterprise

Many employees expect to be able to use their own devices at work. Here’s how enterprise IT teams can ensure the BYOD craze doesn’t expose their...

Read More

2 min read

HPE’s Newest Version of SimpliVity Could Be Groundbreaking for Enterprise IoT

The hyper-converged SimpliVity 2600 could finally bring the IoT in from the cold. The biggest obstacle to widespread IoT adoption is a simple one:...

Read More

3 min read

How to Optimize Your IT Infrastructure for the Internet of Things

The IoT is already making waves in the enterprise space, but as it continues to grow, IT teams need to evaluate whether their existing...

Read More

2 min read

Amid Talk of Space Force, America’s Satellites Still Need Stronger Cybersecurity

The biggest threat to national security resides 26,000 miles from the U.S. mainland — distributed across the United States’ 658 active satellites....

Read More

1 min read

Our New Video Explains Why TTI Is Your One-Stop IT Solutions Provider

The value of a TTI partnership comes to life in our new animated video. Industry leaders across multiple verticals are already highly familiar with...

Read More

2 min read

“Hybrid Cloud” Doesn’t Mean What You Think It Means

Everyone is buzzing about “hybrid cloud” strategies, but clarity around that conversation is being muddled by widely-held misunderstandings of this...

Read More

3 min read

Here’s How the Recent Medicare & Medicaid Changes Will Impact Healthcare IT

The push for telemedicine and opioid response tech in public policy has the potential to simplify documentation for physicians — but it could also...

Read More

3 min read

Can Closing the Cybersecurity Gender Gap Close Its Skills Gap, Too?

A new study from InfoSec Institute shows that the high-tech cybersecurity industry is behind the times when it comes to gender equality — could...

Read More

2 min read

How State Governments Are Bolstering Cybersecurity for the Midterm Elections

In response to the hacking of the 2016 elections by hostile foreign parties, Congress has given state election authorities millions of dollars with...

Read More

3 min read

How to Choose the Perfect Data Storage Solution for Your Enterprise’s Needs

IT pros must recognize their need for more robust data storage to remain competitive in an increasingly data-dense future. Future-proof your...

Read More

3 min read

How to Simplify Multicloud Network Performance

Many companies are turning to multicloud solutions for their network infrastructure, but depending on the internet for network performance presents a...

Read More

3 min read

How to Find the 4 Biggest Gaps in Your Cybersecurity Processes

Your organization’s cybersecurity policy is your best line of defense against cyberattacks, but gaps in your infrastructure may be putting you at...

Read More

3 min read

Are You Protecting Your Lone Workers?

Professionals in a wide variety of fields often find themselves alone in hazardous work conditions. Are you doing all that you can to keep your lone...

Read More

2 min read

Most Cybersecurity Pros Skeptical of “Encryption Backdoors,” New Study Finds

Federal law enforcement agencies are pleading with software and device makers for cryptographic backdoors that will allow them to execute warrant...

Read More

3 min read

How to Secure Your Campus’ Cameras, Alarms, and Other Physical Security Systems

Improperly secured IoT devices represent a significant threat to the integrity of IT infrastructures of campuses across the country. On December 30,...

Read More

3 min read

5 Big Changes in Mobile Enterprise Data That Security Pros Should Prepare For

The potential of mobile enterprise systems to improve productivity and efficiency has made them an essential business function in 2018, but big...

Read More

3 min read

IT Skills Shortage Points Towards Need for Managed Services

Cybercrime is a growing problem, and many companies don’t have the in-house talent to protect their networks. Managed IT services offer companies a...

Read More

2 min read

Everything You Need to Know About MPLS

Despite the broadening appeal of SD-WAN, rumors of MPLS’ demise have been greatly exaggerated. As we’ve written about before, software-defined wide...

Read More

3 min read

Is Your Company Prepared for a DDoS Attack?

DDoS attacks represent a serious, growing cybersecurity threat. Successfully thwarting these malicious assaults seems impossibly difficult, but...

Read More

3 min read

The Financial Case for Implementing RTLS in Your Hospital

Real-time locating systems offer precise indoor asset tracking that empowers hospitals to improve performance, cost-efficiency, and security. Their...

Read More

3 min read

Network Automation Is Hard: Here’s How We Can Make It Easier

The promise of off-the-shelf network automation remains unrealized. But until the day this long-awaited automation solution arrives, IT pros can make...

Read More

3 min read

Are Criminals Entering Your Network Through a Backdoor in the Cloud?

Ubiquitous, destructive, and difficult to defend, backdoor attacks of cloud services constitute unique threats to enterprise networks — and they...

Read More

2 min read

What Defines “Software-Defined Networking”?

“Software-defined networking” has become something of an IT industry buzzword, but its underlying mechanics are more complicated than many people...

Read More

3 min read

What Is Machine Learning, Really?

The technology is being developed for and deployed in practically every industry, but what does the term “machine learning” really mean? More...

Read More

2 min read

To See the Benefits of 5G, Enterprises Must Overcome Barriers to Indoor Connectivity

5G will enable faster mobile internet speeds and lower latency times, while making it far easier to support IoT devices. But new challenges to indoor...

Read More

2 min read

We Know Hackers Threaten Our Digital Assets: Could They Threaten Our Political Discourse, Too?

By leveraging a simple botnet, hackers were able to submit millions of fraudulent comments to the FCC in advance of its vote on net neutrality. We’ve...

Read More

2 min read

Your Security Cameras May Actually Be Your Company’s Biggest Security Flaw

Internet-connected devices like smart security cameras offer enterprises numerous benefits, but with those benefits come serious cybersecurity risks....

Read More

3 min read

The IoT Could Soon Exist Deep Under the Sea

To realize the tremendous potential of the Internet of Underwater Things, the networking community first must find a solution to the problem of...

Read More

3 min read

Why Courthouses Need Strong Security Systems

Courthouses can be dangerous places for judicial officials, which is why stronger security systems are desperately needed. On March 11, 2005, Brian...

Read More

2 min read

How Cutting-Edge Software Can Improve Colleges’ Connectivity

Sophisticated analytics tools are all but a must in increasingly complex networking environments like colleges and universities. “Over the past five...

Read More

2 min read

What the Cybersecurity Skills Gap Can Teach You About Your IT Staffing

The ongoing cybersecurity skills shortage is forcing many companies to find creative ways of keeping their IT infrastructure secure. As author and...

Read More

2 min read

What to Expect from Your Cybersecurity Technology Platform

Many companies are turning to cybersecurity technology platforms as a means of offsetting the ongoing cybersecurity skills shortage. According to...

Read More

2 min read

3 Signs Your Hospital IT Infrastructure Needs an Upgrade

Building a reliable hospital network is inherently difficult, but the rapid, broad-based digitization of the industry in the past few years has made...

Read More

2 min read

Does Today’s App-First Business Environment Call for SDN?

As a growing number of their IT processes migrate to the cloud, enterprises must reevaluate their approach to networking. Until recently, the goal of...

Read More

2 min read

The Board’s Role in Cybersecurity Is Changing

According to cyberlaw expert Michael Yaeger, corporate boards have a responsibility to start taking cybersecurity seriously. According to the...

Read More

2 min read

Companies Still Wary of Making Leap to the Cloud Without Proper Cybersecurity Staff

Companies are still interested in migrating their IT processes to the cloud, but many are struggling to find the requisite cybersecurity talent to do...

Read More

3 min read

From Hotel Workers to Drivers, Employees Demand On-the-Job Security

Workers in a wide variety of fields are asking their employers to bolster workplace safety measures, and with good reason. The workplace can be a...

Read More

3 min read

Why a “Hybrid Cloud” Is the Right Choice for Healthcare IT Organizations

The healthcare industry as a whole remains woefully behind the cloud computing curve, but it’s not too late for healthcare organizations to catch up....

Read More

3 min read

Here’s Why Organizations Everywhere Struggle with Cybersecurity

Corporate data breaches continue to cost companies millions of dollars per incident, yet many IT teams are still struggling to provide robust...

Read More

3 min read

The Future of AI and Networking Will Be Collaborative

As more and more devices come online, IT professionals working to maintain high-performing, secure networks will come to rely on the help of...

Read More

3 min read

Trying to Get Boardroom Buy-In on Cybersecurity? Try a Material Risk Approach

While it’s hard for executives to deny the danger that cybercrime poses both to their bottom line and their relationship with customers, many IT...

Read More

3 min read

General Public Remains Apathetic on Cybersecurity — Here’s What You Can Do to Protect Them

A new survey confirms what many IT industry insiders have known for years: the average internet user values convenience far more than cybersecurity....

Read More

3 min read

According to New Survey, Enterprise IT Simply Isn’t Ready for IoT Adoption

The Internet of Things will soon be a critical component of any enterprise’s infrastructure, but many are ill-prepared to exploit this powerful set...

Read More

3 min read

HIMSS 2018 Directs Industry’s Attention to AI

Artificial intelligence technology — and especially its pivotal role in the shift to value-based care — was a hot topic of discussion at HIMSS 2018....

Read More

2 min read

How Artificial Intelligence Is Redefining the Future of Network Security

It is becoming increasingly difficult for enterprise IT teams to deal with every cybersecurity threat to their organizations, but artificial...

Read More

2 min read

How Vulnerable Is Our Energy Infrastructure?

Energy in America is a contentious political issue, but all parties agree that our energy infrastructure is far too vulnerable to foreign and...

Read More

3 min read

As GDPR Deadline Approaches, Few Enterprises Are Prepared for Implementation

Doing business with the EU just got a bit trickier. Here’s what you need to do to prepare as the Union’s new data privacy laws go into effect. The...

Read More

3 min read

From the Cloud to the Edge: Enterprise IT Moves Back Towards Decentralization

In the era of artificial intelligence and the internet of things, it seems enterprises are returning to data processing ways of the past — and for...

Read More

3 min read

Digital Twin Technology Could Change How Networks Are Built and Monitored

Digital twinning represents the ultimate convergence of the physical and digital worlds, making it the perfect technology for network design and...

Read More

3 min read

Cybercriminals Are Always One Weak Password Away From Cracking Your Company’s Digital Assets

An enterprise’s networks are only as secure as the habits of its most careless employee, meaning comprehensive cybersecurity education is a must. In...

Read More

3 min read

Yet Another Hospital Gets Extorted by Cybercriminals

Hospitals remain a popular target for cybercriminals, who continue to drain America’s healthcare system of valuable resources. Not even 24 hours...

Read More

3 min read

How Artificial Intelligence Could Make WiFi Smarter

Corporate networks are becoming more complex by the day. To keep up, enterprise IT teams should start to consider networking tools driven by...

Read More

3 min read

How to Start Moving Your Hospital to the Cloud

The value of a cloud-based IT infrastructure has become too great for hospitals and other healthcare providers to ignore. In March 2017, U.S....

Read More

2 min read

Network Configuration Is Headed for Big Changes — Here’s Why That’s a Good Thing

Configuring (and managing) today’s massive corporate networks has become completely overwhelming for IT staff, but the rise of AI-based networking...

Read More

3 min read

Can Enterprise Cybersecurity Stand Up to International Threats?

The internet has become yet another front for international warfare over the past decade, which makes robust enterprise cybersecurity an increasingly...

Read More

3 min read

AI Will Be Asset to Both Cybersecurity Teams and Criminals in 2018

The task of cybersecurity is rapidly becoming too complex for humans to handle alone. That’s why artificial intelligence will become an increasingly...

Read More

3 min read

As Smart Devices Make Their Way into the Workplace, Are They Putting Your Company’s Networks at Risk?

Tomorrow’s office environments will be defined first and foremost by IoT devices, but enterprises won’t be able to make good use of them without...

Read More

2 min read

Why Certifications Are Critical in Cybersecurity

Despite the ongoing cybersecurity skills shortage, companies should only pursue cybersecurity professionals with the proper credentials. The world of...

Read More

3 min read

How Organized Cybercrime Works

Cybercrime is on the rise, in part because hackers have learned to run their operations like an agile, modern business. “We believe that data is the...

Read More

2 min read

Poor Cyber Security in Oil Facilities Putting Entire Economies At Risk

Oil rigs and oilfields are incredibly lucrative targets for cybercriminals, which is why it’s so concerning that the oil-producing nations of OPEC...

Read More

2 min read

Why Property Managers Should Offer WiFi as a Service to Their Tenants

Providing free WiFi is a great way for landlords to set their properties apart and guarantee interest from more potential tenants. Regardless of...

Read More

3 min read

Panic Buttons in Hotels Becoming Popular to Protect Hotel Workers from Sexual Harassment

Hospitality workers are subjected to an inordinate amount of sexual harassment and abuse, which is why many hotels are starting to provide panic...

Read More

3 min read

How Troops Stay Connected in Remote Locations

Military forces operating in remote or hostile environments depend on cutting-edge networking technologies in order achieve critical information...

Read More

2 min read

Experts Predict Spike in Ransomware, Extortion Attempts on Healthcare Orgs in 2018

According to a new report from McAfee, ransomware will continue to be the foremost threat to the cybersecurity of healthcare organizations in the new...

Read More

2 min read

College Campuses Continue to Struggle with Cybersecurity

Today’s colleges and universities face unique challenges when it comes to protecting staff and students from cybercrime. What’s causing the industry...

Read More

2 min read

What Will Enterprise WiFi Look Like in 2018?

With a new wireless networking standard set to be released in the near future, 2018 may prove to be a landmark year in enterprise WiFi. From...

Read More

3 min read

Why Healthcare IT Demands End-to-End Networking Solutions

End-to-end networking solutions offer IT teams unparalleled control over performance and security, making them a perfect fit for increasingly complex...

Read More

3 min read

Your Office Christmas Lights Could Be Messing with Your WiFi, and Other Enterprise Internet Surprises

In addition to supporting thousands of connections a day, enterprise networks have to overcome the dozens of interference issues that come with a...

Read More

2 min read

Move Over Fiber Optic Cables: Twisted Light Could Soon Connect Us to the Web at Lightning Speed

As the volume of data transmitted worldwide continues to grow each day, researchers are focusing on new, more efficient ways of transmitting...

Read More

3 min read

How Do You Monetize a Large Public Venue’s Network?

Large public venues are having to create increasingly powerful wireless networks in order to satisfy their patrons’ demands, but this often takes an...

Read More

3 min read

Increasing Student Demand for WiFi Is Hurting Connectivity

Students are bringing more devices to campus than ever before, and using up more bandwidth than ever in the process. As we’ve discussed before,...

Read More

3 min read

How Quantum Computing Will Affect the Future of Networking

Though likely well over a decade away, the quantum computing revolution will fundamentally redefine both hacking and cybersecurity. A spate of recent...

Read More

3 min read

Why Twitter Isn’t the Place to Pinpoint Connectivity Issues

User feedback can be a great way for networking professionals to discover a connectivity problem, but in order to pinpoint the source of the problem,...

Read More

3 min read

Why Are Healthcare Organizations One of Cybercriminals’ Favorite Targets?

The information contained within medical records is often more valuable to cybercriminals than credit card numbers, which means healthcare...

Read More

2 min read

How Much Does It Cost to Secure a Network?

Securing a corporate network usually requires hiring outside experts to perform a comprehensive network audit, but this initial outlay is more than...

Read More

2 min read

Going Green: Tips and Tricks for a More Sustainable Network

The adoption of green networking practices offers enterprises a rare opportunity to make a business decision that improves both the bottom line and...

Read More

2 min read

Keeping a Large Venue’s Network Secure Is Difficult — But Not Impossible

Designing and implementing a wireless network that is equally reliable and secure can be a challenge in a large venue, but it’s possible with the...

Read More

3 min read

3 Tricks for Improving Network Performance Without Breaking the Bank

Improving your company’s network performance can be as easy as making a few simple adjustments — if you know what you’re doing, that is. In the early...

Read More

2 min read

A Healthy Wireless Network Can Make or Break New Health Initiatives for Hospitals

The future of healthcare rests with successful integrations of cutting-edge technologies, but this will require robust and secure wireless networks....

Read More

2 min read

Why the Oil and Gas Industry Is Vulnerable to Security Threats

Despite being particularly vulnerable to cybersecurity threats, the oil and gas industry has yet to take appropriate steps to secure its digital...

Read More

2 min read

From Segmentation to Microsegmentation: Navigating the Transition

As enterprise IT becomes increasingly defined by virtualization and cloud computing, network microsegmentation will be the only way to ensure proper...

Read More

3 min read

Is Intent-Based Networking Relevant?

Cisco’s new intent-based networking software has the IT community talking, but is this solution truly innovative, or is the company simply hoping to...

Read More

3 min read

How to Design Your Hospital’s Wireless Network — and What Could Go Wrong

Hospital administrators must balance such a wide range of considerations when setting up their wireless networks that it’s nearly impossible to do so...

Read More

2 min read

Can Your Wireless Network Keep Pace with Millennials’ Expectations?

Millennials use internet-connected devices more frequently and in ways that require more bandwidth than any other generation. Accommodating that...

Read More