Optimizing IT Spend: Strategies for Balancing Security and Cost-Effectiveness IT is a critical driver of growth and innovation. As such, organizations are increasingly investing in technology to stay competitive and drive growth. However, with the growing importance of technology comes a growing cost. Organizations need to find ways to optimize their IT spend to ensure [...]
Category: Technology
30in30 – Post 5 – SASE: The Future of Network Security and Remote Work
Welcome to the 30-in-30 blog campaign! I'm excited to launch this initiative, which involves publishing a brand new blog post every single day for the next 30 days. I will not mince words about this. It is hard to keep it up, stay engaging, relevant and interactive. More about this campaign is at the end [...]
30in30 – Post 4 – Zero Trust: A Modern Paradigm in Cybersecurity Architecture
Welcome to the 30-in-30 blog campaign! I'm excited to launch this initiative, which involves publishing a brand new blog post every single day for the next 30 days. I will not mince words about this. It is hard to keep it up, stay engaging, relevant and interactive. More about this campaign is at the end [...]
30in30 – Post 3 – Security Modernization: How to Keep Up with Evolving Threats
Welcome to the 30-in-30 blog campaign! I'm excited to launch this initiative, which involves publishing a brand new blog post every single day for the next 30 days. I will not mince words about this. It is hard to keep it up, stay engaging, relevant and interactive. More about this campaign is at the end [...]
30in30 – Post 2 – The Rise of Artificial Intelligence in Cybersecurity: Separating Hype from Reality
Welcome to the 30-in-30 blog campaign! I'm excited to launch this initiative, which involves publishing a brand new blog post every single day for the next 30 days. I will not mince words about this. It is hard to keep it up, stay engaging, relevant and interactive. More about this campaign is at the end [...]
The unspoken truth of Ransomware payouts in Canada
Canadians pay more often for ransomware attacks, and I'll try to explain why I suspect that is.There are a few key parts to a ransomware attack that I'm going to break down first: Initial access TTPs Ransom request Payouts 1) Initial access This is done via a number of ways called threat vectors. Phishing, social [...]
The Canadian Centre for Cyber Security recently released the National Cyber Threat Assessment for 2023-2024
The Canadian Centre for Cyber Security (also known as Cyber Centre) is Canada’s technical authority on cyber security. Part of the Communications Security Establishment (CSE), they are a single unified source of expert advice, guidance, services and support on cyber security for Canadians and Canadian organizations. The Cyber Centre works in close collaboration with Government [...]
VMworld 2018 sessions with Daemon Behr
This year I am presenting two sessions at VMworld 2018 in Las Vegas. Register for CODE5543U here. Register for VMTN7703U here.
Win a free conference pass to VMworld 2018 when you purchase Designing Risk in IT Infrastructure.
One problem with VMworld, is that it really is expensive if you are not sponsored by a company, or get a partner pass, or a blogger pass. So today, I'm offering to change that for someone and make the journey a few thousand dollars cheaper.