Making Predictions in an Unpredictable World

By Chris Gabriel, Chief Digital Officer, Logicalis Europe

In the year of Brexit and Trump, Chris Gabriel, Chief Digital Officer for Logicalis Europe predicts that electronic digital crime will explode, data privacy breaches will claim scalps, automation will be 2017’s buzzword and the open source movement will challenge profit-making business models in his 2017 tech predictions.

Read more

Using Technology to Transform Public Meetings

By Adam Petrovsky, GovEd Practice Leader, Logicalis US

For many government and educational organizations, public meetings are a very important part of the democratic process.  Citizens with an interest in observing or participating in public meetings often attend school board meetings, city or county council meetings, zoning commission meetings or zoning board meetings.  As advances in technology have improved, however, public meetings have adopted a handful of common tools.  Solutions such as live broadcasting via cable networks or the web, audio reinforcement with better microphone and PA systems, laptop use, and projectors displaying presentations are regularly seen at public meeting events.

Read more

What Would an Umbrella Approach to Security Look Like for Your Enterprise?
Part 2: A Secure DNS

Ron Temske, Vice President, Security Solutions, Logicalis US

In Part 1 of my article, I discussed what seems like an insurmountable obstacle. While we require DNS to resolve IP addresses, this also allows it to be leveraged for a variety of malware and attacks. It’s estimated that 97 percent of all attacks involve DNS in some capacity, so the ability for DNS to play a role in security is extensive.

Read more

What Would an Umbrella Approach to Security Look Like for Your Enterprise?
Part 1: Potential DNS Vulnerabilities

Ron Temske, Vice President, Security Solutions, Logicalis US

The starting point for enterprise connectivity to anywhere is the Domain Name Services or DNS. Why not start there for cybersecurity? The purpose of DNS is to resolve names, which humans can remember, into IP addresses used by computers and other connected devices. Comparing DNS to a phone book (Ed. For those of you old enough to remember them!), or your contact lists in Outlook or your phone, is a good analogy.

Read more

Advanced Threats Need a Next-Generation Approach to Cloud Security

By Jason Malacko

Let’s face it. Traditional security methods just aren’t up to the task of protecting organizational infrastructures and data from theft and ransomware. That’s a huge problem, because as organizations increasingly embrace a number of cloud-first platforms for everything from customer relationship management (CRM) to marketing automation platforms (MAP) to enterprise resource planning (ERP) platforms and beyond, they are increasingly at risk from malware and cybercrime that is more advanced and harder to thwart.

Read more

Page 2 of 10912345...102030...Last »
Shares