Posts in Blog
Six Cybersecurity Insights From Ukraine

Ukraine and Russia have been in an active conflict over a disputed border since at least 2014, and this has recently escalated into a full scale military invasion of Ukraine in which Russian leaders have stated that their objective is to replace the Ukrainian government and prevent any notions of a western alliance from materializing.

Read More
BlogGuest User
Cryptojacking: A Love Story

How do you know that coffee is really from Columbia? I mean, they’re spending a lot on advertising to make you believe that, but is there really any way to know? What about contracts, land titles, or marriage certificates? What about your identification? Can we use technology to prove something is authentic? Can we know that those beans are really 100% pure Colombian Coffee?

Read More
What is SD-WAN? Top Ten Things You Need to Know

Anyone who types “What is SD WAN?” into the search bar, looking for a simple definition, might soon stumble headlong into a sea of vendors, carriers, and providers touting diverse features and benefits, Gartner magic quadrants, and the sort of security concerns that accompany new technology. Our engineers explained that SD-WAN is a marketing term that can mean several things. On the surface, SD-WAN stands for “Software Defined Wide Area Network” which is proof that technical people are bad at naming things. We apologize for this. To make it up to you, let’s demystify this a little bit together.

Read More