Eliminating Database Issues with All Flash Storage

In April, CHI Corporation had the opportunity to host a webinar on eliminating database issues with our partners Kaminario, the leader in all-flash storage, and Soaring Eagle Database Consulting. The webinar features input and commentary from Jeff Garbus, CEO/Founder...

Leading with Endpoint Security

Are you leading with endpoint security? If end-user devices are not secured, any smartphone, tablet or laptop becomes a potential entry point for a cyber threat. Business Solutions recapped some of the top reasons to lead with endpoint security, particularly for small...

Data Breaches in the Global Spotlight Last Year

The 2017 IBM X-Force Threat Intelligence Index reported more than 4 billion records leaked in 2016, a number that was more than the combined total of the previous 2 years. A recent article from IBM’s Security Intelligence blog calculated the losses at more than $630...

Ransomware’s Next Target: Manufacturing Companies

Ransomware is expanding to a new target. “Ransomware gangs have moved from consumer computers to health care networks, and they are likely to go after manufacturing companies next, according to researchers at the Georgia Institute of Technology.” – InfoWorld Many of...