The Internet of Hackable Things

The market for wearable technology will explode over the next three years, bringing about the age of the Internet of Things and everyday cybersecurity issues like the aforementioned. And thanks to a recent Symantec finding, hackers aren’t waiting for popular adoption before using what’s already on the market to spy. You think BYOD is bad now? Hold tight.

Technically News - 12/9

This week in Technically News: Battling Malware and Madware; Is PaaS the Savior of the Federal Datacenter Consolidation Initiative; Symantec Gets FISMA Certification for Shared Service Products; 7 IT Strategies for 2014; Less Malware Predicted for 2014 But New Tactics Emerge.

The Best Ways to Eliminate Boredom and Terror on Your Network: Part 3

The first three practices are all about helping you identify all systems under management, standardizing the way you manage these devices, and protecting them from harmful changes. Let’s now build upon this by talking about the remaining two and why they are important. These practices support the thesis that you can eliminate the leading cause of network downtime: simple human error.

The 5 Best Ways to Eliminate Boredom and Terror on Your Network: Part 1

You may be thinking, “If network configuration is months of boredom, then why should I read this?” The short answer is, “So you never have to experience those moments of extreme terror!” Today, we will be talking about why network configuration management is so difficult and what’s at stake. This article is a three-part series that will look at five best practices for improving your network configuration management.

Technically News – 12/2

This week in Technically Speaking: What IT Can Teach Utilities About Cybersecurity & Smart Grids; Open Source Benefits to Govt Outweigh Misconceptions, Report Says; 5 Ways to Keep large IT Projects From Tanking; Continuous Monitoring, Maintenance Needed to Maintain Cybersecurity; Improving Federal Cybersecurity Need Not Involve Congress.