Category: Blog

IT services for startups

IT services for startups

Startups are as popular as they were at the start of their occurrence. This kind of business is quite suitable for solo entrepreneurs, small and big companies as well. Usually, startup owners are very creative people who quickly come up with the idea and need to accomplish it fast. There are a few points to…

Read More Read More

The Router’s Obstacle-Strewn Route to Home IoT Security

The Router’s Obstacle-Strewn Route to Home IoT Security

It is newly minted conventional wisdom that not a single information security conference goes by without a presentation about the abysmal state of Internet of Things security. While this is a boon for researchers looking to make a name for themselves, this sorry state of affairs is definitely not beneficial for anyone who owns a…

Read More Read More

Isn’t It Time to Buy Cyber Insurance?

Isn’t It Time to Buy Cyber Insurance?

Every day we read stories about data breaches and cyberattacks on business and government websites, and the resulting the loss of personally identifiable information (PII). Cybercrime is on the rise, and given the ever-evolving methods of attack, meaningful relief and reliable measures to fend off cybercriminals are unlikely in the foreseeable future.

For the Love of Bricks

For the Love of Bricks

I’ve been spending time this summer barnstorming Barnes & Noble bookstores in New England signing copies of my book on repairing climate change, The Age of Sustainability. These were my first visits to bookstores as a seller, not a customer — and I previously hadn’t visited a store in a while. I wasn’t prepared for…

Read More Read More

Why Coded Enterprises are Winning at DevOps

Why Coded Enterprises are Winning at DevOps

More than 10 years ago ushered in the era of DevOps with the introduction of , the “infrastructure as code” tool. Fundamental to the success of was the belief that “the best way to build software is to do it in close collaboration with the people who use it.” Today there are more than 70,000…

Read More Read More

Don’t Leave Your S3 Buckets Wide Open

Don’t Leave Your S3 Buckets Wide Open

IT security can feel like an endless war against the unknown. Especially when your big old comfortable monolith with one access point gets spread out into a million small microservice pieces all over the place. Securing distributed systems is a challenge that requires constant vigilance and attention to detail.