Why You Need a CDN in 2019

Posted by & filed under List Posts.

Due to the broader use of 4K (aka ultra high-definition) video on social platforms and business websites, along with the higher amount of data being consumed across industries, the content delivery network (CDN) market is growing at a remarkable clip. The compound annual growth rate (CAGR) for the global CDN market was forecast at 32.8%… Read more »

Ecommerce, Meet the GDPR

Posted by & filed under List Posts.

Your company may have already invested substantially in General Data Protection Regulation (GDPR) compliant systems and training for experience in the key global data protection law from the European Union (which went into effect in May)… or it may still be on your organization’s to-do list. While the GDPR is certainly being discussed with great… Read more »

The DDoS Landscape After Mirai & DerpTrolling

Posted by & filed under List Posts.

DDoS attacks

Distributed denial of service (DDoS) is one of the biggest security threats facing the Internet. We can develop a false sense of security when we see the major takedowns of individuals such as Austin Thompson – aka DerpTrolling – and Mirai botnet operator Paras Jha. (Jha was recently sentenced, and Thompson just pleaded guilty.) Despite… Read more »

Domain vs. Organization vs. Extended Validation SSL Certificates

Posted by & filed under List Posts.

Green indicator in address bar -- EV

While a secure sockets layer (SSL) certificate may seem to be a piece of paper, it is actually a file connecting its holder with a public key that allows for cryptographic data exchange. Recognized industry-wide as a standard security component, SSL use is also a ranking factor that assists with search engine optimization (SEO). The… Read more »

How Does Big Data Have Business Value?

Posted by & filed under List Posts.

value of big data

Why does big data matter, in a general sense? It gives you a more comprehensive view. It enables you to operate more intelligently and drive better results with your resources by improving your decision-making and getting a stronger grasp of customers and employees alike. Big data may simply seem to be a way to build… Read more »

Managed Data Protection, Powered by Veeam

Posted by & filed under List Posts.

managed data protection for your IT systems

A 2017 report from IDC found that the data protection and recovery software market was not growing as fast as it had in previous years – dropping to a 2.1% compound annual growth rate (CAGR) from a 6.8% CAGR in 2016. There was much more impressive growth among some players though: smaller providers grew at… Read more »

Why Content Delivery Networks?

Posted by & filed under List Posts.

content distribution network

A content delivery network is designed to send video, images, JavaScript, HTML files, and other content to users through a distributed server network. Generally the two protocols used for CDN delivery are HTTP and HTTPS; however, sometimes other protocols can be useful, as with video. The primary reason CDNs are used is to improve content… Read more »

How DDoS Attacks Have Evolved

Posted by & filed under List Posts.

DDoS history -- distributed denial of service attacks

With the rise of the Internet of Things (IoT), experts have warned that it is incredibly vulnerable from a security perspective – and it has been exploited by DDoS attackers. In September-October 2016, nearly 50,000 connected devices, spread out across 164 nations, were used to achieve traffic as high as 280 Gbps. The attack sent… Read more »

What are the Ethics of Ecommerce?

Posted by & filed under List Posts.

Ecommerce ethics attempt to describe fair and just behavior by online merchants. (Yellow ethics sign)

A Tesla investor sued Elon Musk in early August, saying that they believed his claim on Twitter that he had funding solidified to turn the publicly traded company private was fraudulent. This story is still in development and certainly Musk has not (at least at this point) been found guilty of any wrongdoing. The investor,… Read more »

The ROI of Information Security

Posted by & filed under List Posts.

ROSI - the return on security investment. Fingerprint on keyboard - assessment of solutions

People often talk about security in terms of defenses and caution – an emergency system to prevent worse-case scenarios. However, thinking in terms of defense and prevention can distract us from a fundamental truth: security is powerful. It has an incredible amount of value to organizations across all sectors and markets. Establishing the ROI of… Read more »