Tech at the Gap Decoded: A Look at Maryland’s “Best-Kept Secret” Technology Conference

By Ken Buckler on Oct 23, 2023 1:38:19 PM

Every year, technology enthusiasts and industry leaders gather at the serene Rocky Gap in Western Maryland for Tech at the Gap, an event that has earned the reputation of being one of the hidden gems of Maryland's tech conference scene. This year, the conference's theme, "Decoding Intelligence," promised to unveil the mysteries behind artificial intelligence and its transformative potential. With an impressive lineup of keynote speakers and breakout presenters, the event did not disappoint.

Continue Reading

CMDB is alive and on the rise; cloud found innocent of its demise

By Valerie O'Connell on Aug 21, 2023 2:39:42 PM

Articles proclaiming the death of CMDB started appearing with regularity as early as 2010. Cloud was named as the likely killer. The problem with this bit of folk wisdom is that it isn’t true.

EMA experience and field research consistently find that CMDB use not only continues but is on the rise. In a 2022 EMA initiative on the rise of ServiceOps, 400 global IT leaders stated that CMDB use was central to major functions. For many of those respondents, CMDB use was viewed as increasing in importance for automation of complex processes.  

Where is the disconnect?

Topics: cloud CMDB
Continue Reading

Playing to Win: Generative AI, Cloud Security, and More at Black Hat 2023

By Ken Buckler on Aug 18, 2023 11:48:34 AM

The stage was set, the players were ready, and Black Hat USA 2023 delivered a cybersecurity spectacle that left no doubt—this was a game-changing event. As we unpack the highlights, one overarching theme emerges: a united front against ever-evolving threats. From generative AI to cloud security and a glimpse into the future of defense, this year's conference illuminated the power of collaboration and innovation. Amidst these pivotal discussions, one revelation—the TETRA:BURST vulnerabilities—took center stage, leaving an indelible mark on the field.

Continue Reading

IT Nation Secure Conference Highlights Solutions to the People Problem in Cybersecurity

By Ken Buckler on Jun 13, 2023 6:39:53 AM

Last week, I had the privilege of attending ConnectWise’s IT Nation Secure conference. The three-day conference focused on managed service providers (MSPs) – specifically, how those MSPs can better secure and protect small businesses and midmarket companies. If you haven’t attended this conference in the past but have attended others, I highly recommend attending the ConnectWise IT Nation Secure conference due to the unique perspective they provide for the cybersecurity industry.

Continue Reading

RSA Conference 2023: A “Stronger Together” Moment for Cybersecurity

By Ken Buckler on May 8, 2023 1:15:00 AM

The 2023 RSA Conference was one of the largest and most impactful cybersecurity events of the year. The conference brought together a large number of exhibitors, training sessions, and sponsor briefings and generated a lot of buzz on social media platforms, such as Twitter and LinkedIn. We took some time to analyze the data from social media and the conference and found some interesting trends.

Continue Reading

Star Wars Day – How Security Failures Led to the Empire’s Downfall

By Chris Steffen on May 4, 2023 9:58:11 AM

To celebrate Star Wars Day, I thought I would share a few ways in which the Empire did not adhere to information security best practices, and that enabled the Rebels to win.

To be clear: I do not support the Empire, the Sith Lords, or any other types of scum and villainy. Nor am I trying to portray the Rebel Alliance as a weird, Force-wielding, Galactic hacker consortium or something. But had the Empire not been so lax in their security controls, Emperor Palpatine and his buddies might have been able to bring their “order and peace” to the galaxy.

Continue Reading

What is ServiceOps? A research-based look at why it’s on the rise

By Valerie O'Connell on Mar 20, 2023 3:23:32 PM

A working definition: ServiceOps is a technology-enabled approach to unifying IT service and IT operations management for excellence in delivery of digital business services.

Although the two teams have different charters and skillsets, IT service and IT operations are inextricable. There is no service without effective IT operations.

Continue Reading

How to Mitigate Multi-Cloud Networking Complexity

By Shamus McGillicuddy on Feb 22, 2023 1:08:03 PM

This is a sponsored blog post.

With most companies now operating in multiple cloud providers, network and security complexity are increasing. For instance, 96% of multi-cloud enterprises are using more than one networking vendor across their cloud estates, according to new research from Enterprise Management Associates (EMA).

Continue Reading

The Harsh Truth About Layoffs in the Tech Industry

By Chris Steffen on Feb 14, 2023 10:48:37 AM

Seemingly every day, we hear about the next batch of layoffs from the household-name tech companies: 10,000 here, 1,700 there. As we continue into earning seasons for these publicly traded (and some not publicly traded) companies, we will likely hear more. The substory is that unemployment is at an all-time low, with the job market adding over 500,000 jobs in January. 

Topics: techlayoffs
Continue Reading

A Valentine's Day Wakeup Call: The Heartbleed Vulnerability and the Urgent Need for Improved Cybersecurity

By Ken Buckler on Feb 14, 2023 6:05:20 AM

As of January 2023, Over 194,000 Systems on Internet Still Vulnerable to Heartbleed

The Bleeding Heart of the Internet

In April 2014, the Heartbleed vulnerability was publicly disclosed, sending the information technology world into a panic and rushing to patch this critical vulnerability in OpenSSL, which was allowing the theft of information directly from the memory of vulnerable systems, including private keys and other secrets. This vulnerability featured extremely easy exploitation by attackers, leaving no trace of attacks. Heartbleed ultimately resulted in many late nights for most of the information technology industry, who worked to implement and validate patches for open and closed source products that have integrated the OpenSSL libraries – which accounts for an extremely large percentage of technologies connected to the internet.

Continue Reading
  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts