Cybersecurity Attacks Deconstructed: Colonial Pipeline
In the latest episode of Attacks Deconstructed, Partner Ben Matthews and CISO expert Matthew Rosenquist deconstruct the recent Colonial Pipeline attack.
In the latest episode of Attacks Deconstructed, Partner Ben Matthews and CISO expert Matthew Rosenquist deconstruct the recent Colonial Pipeline attack.
In the Attacks Deconstructed podcast series, Partners Michael Gurau and Ben Matthews, along with cybersecurity expert and CISO Matthew Rosenquist break down recent cyberattacks to understand the attacker, goals, methods, and targets of the attack.
As processors have moved from highly concentrated environments to highly distributed ones, use cases have proliferated and become more specialized.
Amid the almost daily news of cyberattacks on industry and
Evolving and increasingly effective cybersecurity threat agents elevate risk across all sectors and the entire telecommunications and technology continuum – from the network to the edge.
In an interview with Computer Weekly Altman Solon’s Josh Zaretsky discusses the benefits of automation technologies and explains why decision-makers are best advised to complete a full business case before adopting automation technologies.
We recently issued a white paper on SD-WAN adoption, which included analysis of data from a survey of 300 IT decision-makers. The paper, released in partnership with Bank Street, has generated a lot of interesting feedback.
The negative macroeconomic effects of COVID-19 have been swift and
The fierce battle for the public cloud features three top tech titans – Amazon, Microsoft, and Google – in what will be a long and bruising competition for customers and revenue.
Assessing a cloud managed service provider and evaluating their future potential depends on both market growth and unique company capabilities and relationships.