e92plus Blog

Star Wars, Network Security and the Force of SD-WAN

Feb 12, 2018, 08:57 AM Ben Gane

Like me, you’ve probably seen Star Wars: The Last Jedi a few times already. And, like me, you probably enjoyed it more than you expected. (For me it may have been partially due to the full-reclining seats, buttered popcorn, and 3-D glasses, but I digress). The Last Jedi got me thinking about...

Read More

Engaging in a healthy transformation

Feb 12, 2018, 08:55 AM Ben Gane

Information is literally the lifeblood of nearly every organization. And for the healthcare industry in particular, ensuring the uninterrupted flow of information is absolutely critical for the effective diagnosis and treatment of patients. While digital transformation (DX) has become an imperative across nearly...

Read More

Why Artificial Intelligence Is Our Last Invention (With Author James Barrat)

Feb 12, 2018, 08:48 AM Ben Gane

The Interchange IT Podcast is honored to have author and documentary filmmaker, James Barrat on the podcast. We talk to James about how he became interested in AI, the people he has interviewed, and how he developed his AI opinions. We also discussed the fallacies of Isaac Asimov’s Three...

Read More

A Look Back: Reviewing the Worst Cyber Attacks of 2017 and the Lessons Learned

Feb 12, 2018, 08:37 AM Ben Gane

It seems that each year that passes is worse than the last in terms of hacking and cyber attacks, and 2017 was no exception.“Surprising no one, 2017 was marked another ‘worst year ever’ in data breaches and cyber incidents around the world,” said Jeff Wilbur, director of the Internet Society’s...

Read More

Forcepoint operating system lockdown tool now open source

Feb 12, 2018, 08:33 AM Ben Gane

Forcepoint’s operating system (OS) lockdown tool, formerly known as Security Blanket, is now an open source project called “OS Lockdown.”This powerful tool is used to harden systems by aligning settings with published STIGs (Security Technical Implementation Guide), custom profiles built...

Read More

Malware Protection Against Today’s Extreme Cybersecurity Threats

Feb 7, 2018, 11:17 AM Jenna Clements

Malware protection is more important today than ever since cybersecurity threats are on the rise. No great surprise there, right? But why, exactly, are cyber security threats so prevalent? The uptick is in no small part due to how much easier it is to take up the mantle of cyber attacker...

Read More

Keeping the lights on

Feb 1, 2018, 08:38 AM Ben Gane

If there’s one industry where being kept in the dark is a very bad thing, it’s the energy and utility sector. Keeping the lights on and limiting outages is an imperative for energy providers. This has led suppliers to examine how digital transformation (DX) can improve their ability to maintain service availability...

Read More

The Evolution of Ransomware

Feb 1, 2018, 08:35 AM Ben Gane

While many businesses and individual users understand that ransomware isn't a new threat, many don't actually know how long this particular infection style has been utilized by hackers. The first attacks took place more than a decade ago, and since then, ransomware authors have...

Read More

How your enterprise applications could be putting your company at risk

Jan 31, 2018, 12:09 PM Ben Gane

The typical company, large or small, depends on a number of different enterprise applications in order to ensure that employees can complete critical, daily tasks. Apps like those for enterprise resource planning, customer relationship management, screen and file sharing have become commonplace...

Read More

Security Controls and Third-Party Patching: Ivanti Has an Ear for It

Jan 31, 2018, 09:09 AM Ben Gane

You’ve likely heard of perfect pitch. Only one in 10,000 people is blessed with the trait, but when it comes to security controls and patching third-party applications, virtually every IT department can achieve “perfect patch.” Perfect pitch—or absolute pitch—is the rare ability to identify or sing a...

Read More
to Top