Seven Cybersecurity Questions Boards Need to Ask

For every new technology that cybersecurity professionals invent, it’s only a matter of time until malicious actors find a way around it. We need new leadership approaches as we move into the next phase of securing our organizations. For Boards of Directors (BODs),...

Why LinkedIn is as Dangerous as it is Useful

Everybody uses LinkedIn. Everybody. I mean, at last count the site had 722 million subscribers. That’s what makes the site so incredibly useful for networking, job hunting, recruiting, and promoting your business. It’s also what makes LinkedIn a huge security threat....

Welcome to the Software-Defined Storage Revolution

In the wake of the pandemic, the urgency for truly distributed platforms has peaked. Distributed applications that, just two years ago, were side projects for many environments have been pressed into production. In many cases, you have faced an unpleasant choice:...

Rewriting the Genetic Code of Storage

Rapid, near-constant change is the defining state of today’s modern, digitally transformed business environment. As the past year has made painfully clear, it is time for a storage infrastructure and a storage strategy that can rapidly adapt. Such flexibility is...

Seven Talking Points for 5G vs Wi-Fi

The goal of this blog is simple: to arm chief information officers (CIOs) and other network professionals with quick and easy talking points to think and speak intelligently about enterprise Wi-Fi and 5G. Talking Point #1: Wi-Fi and 5G are simultaneously...