Cloud

Building Resilience Through the Cloud in a Post-Pandemic World

As we look to a post-pandemic world, one of the areas of investment we can expect to see is in building resilience to destructive type attacks. 2020 saw a record number of distributed denial-of-service (DDoS) and ransomware attacks, which is only expected to continue through the rest of this decade. Many organizations are now looking to the […]

06.21.2021

Announcements

Build your cybersecurity team: Which roles to outsource, which to keep in-house?

In an earlier post we looked at typical headcount costs and other expenditures to build and maintain the full scope of cybersecurity capabilities in-house. Those figures often put a completely internal team out of reach, but the good news is that a strong cybersecurity strategy doesn’t need to be an all-or-nothing effort. Here we’ll explore […]

05.27.2021

Security

MDR services and managing cybersecurity within your business

No matter the size, industry, or location, nearly every company today has a cybersecurity strategy. But there are many methodologies your organization can use to protect its digital assets and determining the right approach for your business means balancing your desired cybersecurity posture against your resource availability of staff and money. Given the evolving threat […]

04.19.2021

Security

Apply Ordr to your IoT chaos

Businesses have leveraged Internet of Things (IoT) capabilities for years and the use of these devices – sensors, monitors, and other smart technologies with Internet connectivity – is exploding. Unlike cell phones and laptops, IoT devices aren’t usually linked to any one user. Instead, they’re the communication component in a heart monitor that lets hospital […]

12.22.2020

Security

Apps in the Firing Line: The Enduring Power of DDoS Attacks

This blog was originally posted on F5.com. Applications are the face of your company. Customer goodwill is won or lost in a heartbeat these days, so downtime of any description is not an option. Every second you are out of commission is a potential prelude to financial and/or reputational loss. While there are a multitude […]

10.28.2020

an IoT fitness device

Security

Carousel Industries and Ordr: Uncovering the IoT Surprises Hiding Within Your Network

This blog post was originally featured on the Ordr blog. First, some straight-up pragmatism: IoT devices probably won’t get much more secure as time goes on. There’s just not enough impetus for manufacturers to add security capabilities. Couple that lack of onboard security with the fact that IoT usage is rapidly increasing, and the onus […]

10.26.2020

Security

Zero Trust Architecture and moving beyond VLANs for segmentation

For years enterprises have been deploying VLANs to segment their networks. The thought was that devices in one segment were limited in their ability to adversely affect devices in another. This approach to security in fact provided very little in the way of actual risk mitigation, and in reality provided a false sense of security. […]

10.16.2020

Networking

Steps to a seamless SD-WAN migration

As more companies transition from MPLS to SD-WAN, the migration process has become less uncertain and significantly more streamlined than in the technology’s early days. A 2019 study conducted by IDC revealed that 39% of enterprises already have invested in SD-WAN solutions  and by 2021 the number of organizations deploying this technology will reach 94 percent. As […]

08.24.2020

Networking

5 benefits of moving from MPLS to SD-WAN

Are you considering a move from MPLS to SD-WAN? Many companies have seen in making the switch, with SD-WAN services delivering a host of capabilities that are increasingly important for businesses moving through their digital transformation journeys. Whether you want to enhance application performance, reduce the time to add new sites, or give your organization […]

08.04.2020

Security

Ripple20 leans on old vulnerabilities, shows need for new IoT security strategies

The Internet of Things (IoT) is no longer just big, it’s gargantuan. It’s sprouting new arms and legs every day, and that enormous quantity of IoT devices is creating some worrying risks for businesses. With so many devices proliferating across the world, any vulnerability’s impacts have the potential to be far greater – far more […]

07.28.2020