Skip to the main content.

Craig Badrick

2 min read

Most Cybersecurity Pros Skeptical of “Encryption Backdoors,” New Study Finds

Federal law enforcement agencies are pleading with software and device makers for cryptographic backdoors that will allow them to execute warrant...

Read More

3 min read

How to Secure Your Campus’ Cameras, Alarms, and Other Physical Security Systems

Improperly secured IoT devices represent a significant threat to the integrity of IT infrastructures of campuses across the country. On December 30,...

Read More

3 min read

5 Big Changes in Mobile Enterprise Data That Security Pros Should Prepare For

The potential of mobile enterprise systems to improve productivity and efficiency has made them an essential business function in 2018, but big...

Read More

3 min read

IT Skills Shortage Points Towards Need for Managed Services

Cybercrime is a growing problem, and many companies don’t have the in-house talent to protect their networks. Managed IT services offer companies a...

Read More

2 min read

Everything You Need to Know About MPLS

Despite the broadening appeal of SD-WAN, rumors of MPLS’ demise have been greatly exaggerated. As we’ve written about before, software-defined wide...

Read More

3 min read

Is Your Company Prepared for a DDoS Attack?

DDoS attacks represent a serious, growing cybersecurity threat. Successfully thwarting these malicious assaults seems impossibly difficult, but...

Read More

3 min read

The Financial Case for Implementing RTLS in Your Hospital

Real-time locating systems offer precise indoor asset tracking that empowers hospitals to improve performance, cost-efficiency, and security. Their...

Read More

3 min read

Network Automation Is Hard: Here’s How We Can Make It Easier

The promise of off-the-shelf network automation remains unrealized. But until the day this long-awaited automation solution arrives, IT pros can make...

Read More

3 min read

Are Criminals Entering Your Network Through a Backdoor in the Cloud?

Ubiquitous, destructive, and difficult to defend, backdoor attacks of cloud services constitute unique threats to enterprise networks — and they...

Read More

2 min read

What Defines “Software-Defined Networking”?

“Software-defined networking” has become something of an IT industry buzzword, but its underlying mechanics are more complicated than many people...

Read More

3 min read

What Is Machine Learning, Really?

The technology is being developed for and deployed in practically every industry, but what does the term “machine learning” really mean? More...

Read More

2 min read

To See the Benefits of 5G, Enterprises Must Overcome Barriers to Indoor Connectivity

5G will enable faster mobile internet speeds and lower latency times, while making it far easier to support IoT devices. But new challenges to indoor...

Read More