General Computing Executive Commentary

  1. Tape Has Died Many Deaths, Now It Lives In The Cloud
    12/2/2016

    It is easy to understand why tape has been occasionally challenged as a key technology for data retention and why it has stubbornly remained indispensable to industries with a great deal data. By Mark Pastor, director of archive and technical workflow solutions, Quantum

  2. 5 Ransomware Prevention Tactics Your Customers Need To Know
    12/1/2016

    As your customers begin to wind up 2016 and plan ahead, one variable we know will continue into the New Year is the increasing frequency of ransomware attacks. An industry statistic from the Herjavec Group estimates ransomware costs will reach a startling $1 billion for 2016.

  3. Clearing The Fog: A Vision Of Security For Hybrid Clouds
    11/29/2016

    How organizations can ensure visibility, protection, and control for critical data and assets across on premise, private, and public cloud environments By Check Point

  4. Overcoming The 3 Stages Of SSH Key Management Grief
    11/22/2016

    There’s a kind of grief that occurs when small and mid-sized organizations realize that have a gaping hole in their network security because of inconsistent or non-existent SSH user key management. And, like the familiar stages of grief, once the denial is over there are three stages of coming to grips with and rectifying poor key management. By Matthew McKenna, chief strategy officer, SSH Communications Security

  5. How To Keep Your Customers Protected From Constantly Changing Ransomware
    11/18/2016

    If you’re old enough to remember 1989, you might recall two key events: the Berlin Wall came down, and the first ransomware attack appeared on the scene. This was the AIDs Trojan horse, which, upon installation, encrypted users’ files and demanded $189 be sent to a post office box in Panama to “renew the license.”

  6. Could Artificial Intelligence Be The Channel’s Genie In A Bottle?
    11/10/2016

    Most of us have heard about self-driving cars, mind-bending smart speakers that can answer almost any question, and intuitive retail sites that make product suggestions based on shopping habits. These innovations all have one thing in common — artificial intelligence (AI) — and it could be the hottest technology trend of the next several years. But what does it mean for the channel?

  7. How DRaaS Helps VARs And MSPs Grow Their Business
    11/9/2016

    The scare of Hurricane Matthew further proves a scalable and flexible disaster recovery plan should be in place before a natural disaster, hardware failure, or human error puts a company’s viability in jeopardy. To minimize loss and reputation damage, businesses must have systems that protect data and applications so employees can resume normal operations as soon as possible.

  8. 3 Premium Ways To Prevent IT Project Failure
    11/8/2016

    It is an unfortunate reality most IT projects don’t end well; in fact researchers found 68 percent end up marginal or outright failures. For software-related projects, only 16.2 percent are completed on time and on budget. If you are a large organization, that number drops to 9 percent. Many never realize the promised value or ROI.

  9. The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach
    11/7/2016

    Over the last year, Threat Intelligence (TI) has become a hot topic for the cybersecurity industry. Organizations of all sizes are looking to the channel to provide recommendations on what to purchase, how to implement, and how to gain the greatest value from TI. It is therefore critical the channel clearly understands what TI is, and how organizations can capitalize on its value.

  10. Warning: What You Need To Know About The Security Workforce Crisis
    11/4/2016

    Is the shortage of trained security people the greatest vulnerability?