Frank Ohlhorst is an award-winning technology journalist and IT industry analyst, with extensive experience as a business consultant, editor, author, and blogger. Frank works with both technology startups and established technology ventures, helping them to build channel programs, launch products, validate product quality, create marketing materials, author case studies, eBooks and white papers.
Network complexity is becoming one of the primary reasons for failure in the enterprise. After all, the more complex a network is, the more likely that there are blind spots, which often are only discovered in investigations appear after things have already gone awry in costly incidents leading to disruption. Today’s network managers are constantly […]
Cybersecurity hygiene has become one of the most important factors of protecting enterprise networks from intrusions, data theft and other malicious activities. Yet, many enterprise security staffers have come to rely on assumptions, as opposed to measuring the actual vulnerabilities that may impact their security posture. Simply put, assumptions are made based upon what patches […]
Certificates have become a necessary technology across the enterprise as a mechanism to keep things secure. However, managing digital certificates can be anything but easy. After all, there are numerous certificate authorities, different types of certificates, expiration dates, application integrations, certificate ownership, and numerous other bits of meta-data that must be managed and accounted for […]
New York City-based Kemp Technologies, known for its application delivery controllers and load balancers, is fully embracing the multi-cloud approach of application delivery. What’s more, the company is further developing its management and monitoring platforms to support heterogeneous environments that use ADCs from the likes of F5, NGINX, HAProxy and AWS (ELB). The company is […]
Defining context and performing risk analysis have become the cornerstone of building effective cybersecurity. After all, today’s ideology of risk avoidance has become one of the major methodologies for eliminating the threats posed by the latest attack vectors. Yet identifying attack vectors—as well as building resilient systems—takes a witch’s brew of analytics, data science and […]
The rise of global compliance regulations such as the European Union’s General Data Protection Regulation (GDPR) and the forthcoming California Consumer Privacy Act (CCPA) is forcing enterprises to look at privacy issues in a new light. One of the biggest challenges facing organizations attempting to protect privacy comes in the form of data in motion, […]
Open networking software developer Pica8 has launched the Pica8 Nymble Automation Framework, which bundles together server-based tools and agents to automate software installation and configuration across open, white box and brite box switches. Nymble has the potential to displace industry network switching leaders, such as Cisco and Aruba, by bringing advanced automation tools to lower […]
Data has a story to tell–at least to those who know how to listen to it. However, data scientists who can connect the dots and bring forth insight from a mashup of unstructured and structured data are a rarity in today’s world. Many businesses are looking to supplement the capabilities of data science pros using […]
Quantum computers will be able to instantly break the encryption of sensitive data protected by today’s strongest security, warns Arvind Krishna, director of IBM Research. “Anyone that wants to make sure that their data is protected for longer than 10 years should move to alternate forms of encryption now,” said Krishna. Krishna was speaking at […]
Seattle-based Marchex is looking to vastly improve how businesses interact with customers, increasing lead conversion, improving the customer experience and establishing repeat business. These are goals that are not lost on those trying to grow businesses in today’s highly competitive market. Bringing Additional Value to Business to Customer Interactions Many organizations have discovered that interacting with […]