Sorry, the language specified is not available for this page

    CloudFormation Scoping for Beginners

    by Greg Cox When most people begin working with CloudFormation, they usually start with examples or tutorials they find online. After that, they quickly start... Learn More

    Gartner Magic Quadrant for Data Center Outsourcing and Hybrid Infrastructure Managed Services, North America

    One of the biggest challenges businesses face today is making informed decisions on how to transform their IT organizations from legacy data centers into the required... Learn More

    People’s Choice Awards: Winning Followers, One Vote at a Time

    What could Barbra Streisand, John Wayne, Star Wars and The Sting possibly have in common? More than forty years ago, they were the most popular entities in popular... Learn More

    Six Qualities of Powerful Women Leaders

    Every year in the June issue of CRN, The Channel Company publishes its Women of the Channel list citing the professional accomplishments, demonstrated expertise and... Learn More

    National Weather Service data outage: 3 reminders for improving resiliency

    Memorial Day Weekend 2018 was a deluge for many parts of the country. Flash floods ripped through Ellicott City, Maryland. Subtropical storm Alberto triggered states of... Learn More

    Sungard AS and Actifio Deliver Modern Backup & Recovery

    Keep energy flowing. Keep real estate protected. Keep medicines available. From energy suppliers to global real estate brokers to national pharmacies, companies around... Learn More

    Small Businesses: A Goldmine for Hackers

    News reports of cyber-attacks tend to focus on corporate giants and high-profile brands. But a worrying trend is emerging among small businesses, which are now... Learn More

    Creating a Cyber Security Incident Response Plan

    The number, sophistication and severity of cyber attacks is increasing, and any business handling customer data, which can be easily monetized, is a top target. A data... Learn More

    Could Legacy IT Sink Your Ship?

    It was discovered last year that many maritime vessels were under significant threat of cyber breaches because they were using outdated software. Tankers were vulnerable... Learn More

    What Are Phishing Attacks and How Do You Spot Them?

    The threat of a cyber-attack is growing and with high profile hacking scandals filling the headlines, it seems like 2017 is the year businesses are finally waking up to the... Learn More

    IoT Poses Growing Cyber Security Risks

    There is seemingly nothing that can't be connected to the internet – from parking meters to washing machines and even cattle. But the corollary is that everything that can be... Learn More

    10 Cyber Security Tips for Any Growing Business

    The internet has brought huge advantages to small- and medium-sized businesses. But it also brings the risk of cyber attacks, attempts to steal information or money, or... Learn More
    x

    SUBSCRIBE TO OUR BLOG

    Advice, stories, and expertise about work life today.

    x

    THANK YOU!

    We know your inbox is protected space, so we promise to send only the good stuff, twice a month.