We offer decades of experience in technology solutions, combined with in-depth knowledge of the latest industry advances.
Article
Overall, there is a weak grasp on what "Cloud Security" actually means. I recently spent time discussing possible challenges with cloud security at a cybersecurity conference. As I tried to pack my research into the allotted twenty-five minutes, I quickly realized we, collectively, don’t...
Article
Years ago, when I sat for my CISSP, I went into the exam carrying two bits of advice offered to me by a mentor: #1. In matters of security, choose the most conservative path.#2. Life safety above all else. Critical...
Article
The Harvard Business Review conducted a study to understand how successful teams collaborate using file sharing technology. In general, they discovered the following fingerprints of successful team collaboration in the logs of their file sharing technology: Smaller teams are more successful.Research...
Article
As problem-solvers, we like to think outside the box at Sayers. Sometimes, however, the best solution is inside the box. Hyperconvergence is one of those situations where you shouldn’t ignore the box, because the answer is there. A hyperconverged IT platform presents the...
Article
This week GitHub became the victim of the largest DDOS attack ever recorded due to a new amplification attack being observed in the wild. This attack, which did not require building a botnet or compromising any servers, was able to generate 1.35TBps...
Article
Most of us working in Information Technology are aware of the Moore’s Law observation. A gross over-simplification would be to say the transistor density on an integrated circuit doubles about every two years (some quote 18 months), and as a...
Article
“Guardian, this is Rapier....three klicks southeast of target…Rapier is Oscar Mike. Radio silent. Over.” “Copy Rapier. This is Guardian. Out.” “Guardian, this is Rapier. Code worked. Rapier in the perimeter headed to target…..FRV in five. Over” “Roger. Out….” “Guardian, this...
Article
Everything you need to know about KRACK(Key Reinstallation Attacks) What is it? Mathy Vanhoef, a technical security researcher, found what we are now calling “KRACK” to be a devastating security flaw in the relatively “secure” standard for wireless networks WPA. KRACK allows...
Article
Both HPE and Dell EMC announced triple digit growth of hyperconverged solutions in their latest quarterly results. Nutanix more than doubled quarterly revenue year over year. VMWare VSAN, barely 3 years old, has crossed over the 10,000 customer mark. Companies...
Article
7 Year Old Code-execution Bug Found In Samba It appears Wannacry may have gotten people looking at the SMB functions in Samba on Linux as well. A code-execution bug was detected in all versions of Samba 3.5.0 (released March 2010)...