Eliminating Database Issues with All Flash Storage

In April, CHI Corporation had the opportunity to host a webinar on eliminating database issues with our partners Kaminario, the leader in all-flash storage, and Soaring Eagle Database Consulting. The webinar features input and commentary from Jeff Garbus, CEO/Founder...

Ransomware and WannaCry

What makes me want to cry is how much this whole thing has been blown out of proportion by people sensationalizing it for various reasons, be it for advertising views, pushing product, or trying to incite panic. There are some things that make this different. These...

Leading with Endpoint Security

Are you leading with endpoint security? If end-user devices are not secured, any smartphone, tablet or laptop becomes a potential entry point for a cyber threat. Business Solutions recapped some of the top reasons to lead with endpoint security, particularly for small...

Data Breaches in the Global Spotlight Last Year

The 2017 IBM X-Force Threat Intelligence Index reported more than 4 billion records leaked in 2016, a number that was more than the combined total of the previous 2 years. A recent article from IBM’s Security Intelligence blog calculated the losses at more than $630...

Ransomware’s Next Target: Manufacturing Companies

Ransomware is expanding to a new target. “Ransomware gangs have moved from consumer computers to health care networks, and they are likely to go after manufacturing companies next, according to researchers at the Georgia Institute of Technology.” – InfoWorld Many of...

Autonomous Vehicle Development Relies on Data

It may be hard for some of us to imagine, but a day will come when the majority of cars on our roads and highways are driving themselves. These autonomous, or self-driving, cars have the capability of sensing their environment and navigating without human input...

Truth About Ransomware

Many vendors today are leveraging ransomware as a sales opportunity. I recently had a conversation with Paul Comfort, our security expert here at Chi, and he provided some practical thoughts about ransomware that I felt were worth sharing. To many, this may seem like...