archives

Managing Device Connectivity on Campus

Higher education institutions have been dealing with BYOT for some 15 years, making them pioneers of this massive technology transformation.

Read more

The Dyn DNS DDoS Attack, and What to Do About It

The Dyn Attack Explained On October 21 2016, Dyn, a major internet Domain Name System (DNS) service provider, was attacked.  This attack used a massive…

Read more

No Compromise Network Service on the AWS Cloud

For today’s technology leader, it’s no longer a question of whether you’ll integrate cloud deployments into your IT infrastructure. In fact, for many…

Read more

BlueCat Scores Top Marks in Company Culture, Earns Great Place to Work™

It’s official, BlueCat is now certified as a GREAT WORKPLACE by Great Place to Work® Canada. Earning this achievement was no small feat – the process…

Read more

Five Tips to Reduce Dwell Time

Dwell time is arguably the most accurate indicator of an enterprise’s security.

Read more

Pokemon Go: When Cybersecurity “Breaches” Real Life

Many of you may have recently seen what appear to be zombies roaming the planet in search of their next victim. 

Read more

Top Security Issues for the C-Suite: Q&A with BlueCat’s Director of Cybersecurity Solutions

Security continues to be top of mind for all organizations. Threats are more pervasive, sophisticated and appear as headlines in the news on a regular…

Read more

Take your PCI compliance to the next level

Think about how many times each day you pull a credit or debit card out of your wallet to pay for gas, groceries, a cup of coffee, or a new pair of shoes.

Read more

Passwords aren’t going anywhere anytime soon, so make sure you have a good one

Years ago, futurists predicted many advances such as flying cars, teleportation, a cure for old age to name a few things that would be available by now.…

Read more

BlueCat Hackathon: Blows expectations out of the water

Think of a software feature you can’t remember life without. It can be anything: The “Like” button on Facebook, tagging in social media comments, the…

Read more

Managing Cyber Attacks in the Health Care Industry

The health care industry is more susceptible to cyber attacks than any other industry today.

Read more

IT Strategy: Building Business Relevance- Kroger’s CIO did.

A solid IT strategy and the right leadership mindset are critical for success

Read more