SD-WAN Savings: Fact or Fairytale?

SD-WAN Savings: Fact or Fairytale?

As children, we love fairy tales for their happy endings. As we become adults, however, we realize that happy endings aren’t always guaranteed. Sometimes, good ideas end up with bad results or, more often, no result at all. IT professionals are very familiar with this...
Seven Cybersecurity Questions Boards Need to Ask

Seven Cybersecurity Questions Boards Need to Ask

For every new technology that cybersecurity professionals invent, it’s only a matter of time until malicious actors find a way around it. We need new leadership approaches as we move into the next phase of securing our organizations. For Boards of Directors (BODs),...
Why LinkedIn is as Dangerous as it is Useful

Why LinkedIn is as Dangerous as it is Useful

Everybody uses LinkedIn. Everybody. I mean, at last count the site had 722 million subscribers. That’s what makes the site so incredibly useful for networking, job hunting, recruiting, and promoting your business. It’s also what makes LinkedIn a huge security threat....
Rewriting the Genetic Code of Storage

Rewriting the Genetic Code of Storage

Rapid, near-constant change is the defining state of today’s modern, digitally transformed business environment. As the past year has made painfully clear, it is time for a storage infrastructure and a storage strategy that can rapidly adapt. Such flexibility is...