The evolution of security driven by the advancements in network designsAugust 21, 2020 | Trent Pham | 3 min read Securing the perimeter During the late 90s, enterprises invested in expensive, high-capacity (e.g., T3 and OC3) connections as they raced towards the burgeoning online world to support their B2C and B2B initiatives. The servers, applications...
The evolution of security driven by the advancements in network designsAugust 21, 2020 | Trent Pham Securing the perimeter During the late 90s, enterprises invested in expensive, high-capacity (e.g., T3 and OC3) connections as they raced towards the burgeoning online world to support their B2C and B2B initiatives. The servers, applications...
Protecting Your Business from Crimes of OpportunityJune 10, 2019 | Trent Pham Security events occur frequently but may not capture our attention unless they are more spectacular than the last, like Marriott’s data breach of half a billion records. We’ve all forgotten by now the personal identifiable information...
Mitigating DDoS Threats on Your Own TermsDecember 6, 2018 | Trent Pham Insurance is that product we all buy but hope we never use. Of course, paying for something you don’t use can create a dilemma. Let’s say your company offers an optional dental plan. By opting-out,...
4 Essential SD-WAN Security DefensesOctober 16, 2018 | Trent Pham SD-WAN’s growing popularity stems from the advantages it offers by moving key business functions to the cloud: simplified management, increased efficiency and resiliency, improved scalability, and significantly lower costs. It’s little wonder that SD‑WAN growth...
What is GDPR and What You Need to KnowJuly 17, 2018 | Trent Pham GDPR, the European Union’s new General Data Protection Regulation, hasn’t received a great deal of press in the U.S., presumably because it is a “Europe thing.” However, U.S. companies are in fact subject to GDPR...
What is a DDoS attack and how to prevent themJune 11, 2018 | Trent Pham Business spending for cyber security has evolved from once being part of an IT budget to becoming its own budget – that’s at least true for large enterprises. Small Medium Businesses (SMB) continue to subscribe...
Is Your Enterprise Making Sensitive Information Unintentionally Vulnerable?March 14, 2018 | Trent Pham Most employers take great care in protecting any and all employee personal information they store, such as social security numbers and credit cards used for travel. When that care doesn’t extend to making sure employees,...
Are You Overlooking the Most Direct Threat to Your Network Operations?November 13, 2017 | Trent Pham Quick: Which of the following poses the greatest threat to network operations? A: Breaches B: Distributed denial of service (DDoS) attacks Correct answer: “B.” If you chose “A,” consider that the question concerns “operations” –...