Craig Badrick

4 min read
The Ultimate (Forward-Looking) Enterprise IT Security Checklist

Building a secure network for your enterprise means evaluating your vulnerabilities now — and understanding where your risks will come from in the...

3 min read
Overcoming the Challenges of Transitioning to SD-WAN

Industry experts promise that SD-WAN will transform how enterprises do business, manage their networks, and secure their data — but it isn’t without...

3 min read
AIOps Will Not Replace Your IT Team

AIOps is a powerful tool, and although it will require enterprises to acquire new skill sets and remodel their IT teams, it won’t replace human...

VIDEO: Why the Oil and Gas Industry Is Vulnerable to Security Threats


3 min read
Attacking the Attackers: How Deception Technology Gives Cybersecurity Pros the Upper Hand

Conventional wisdom suggests hackers have the upper hand in the war for cyber-supremacy, but deception technology has the potential to tip the odds...

3 min read
Successful CISOs Do These Five Things

CISOs bring their niche expertise to bear on organizational data security — all on limited budgets and under mounting pressure. What are the best...

3 min read
Universities Can’t Upgrade Networks Fast Enough as Collegiate eSports Take Off

University IT departments must take steps to bolster their campus networks as collegiate eSports become increasingly popular. On October 19, 2014,...


3 min read
How Today’s Cutting-Edge Smart Factories Are Transforming Global Industry

Smart factories bring sophisticated network solutions to bear on systemic industrial inefficiencies. With the right tools, they can help your...