The recent proliferation of ransomware attacks is staggering; the virtual working environment, driven in part by the way COVID-19, exacerbated the situation. One security vendor, Skybox Security, found that, thus far, ransomware incidents grew by 72% throughout the pandemic.

It’s likely that your financial institution is already taking the threat…


The recent proliferation of ransomware attacks is staggering; the virtual working environment, driven in part by the way COVID-19, exacerbated the situation. One security vendor, Skybox Security, found that, thus far, ransomware incidents grew by 72% throughout the pandemic.

It’s likely that your financial institution is already taking the threat…


Advances in the capabilities of emerging technology are rapidly changing the way business output is measured. It is no surprise that organizations seeking to achieve and maintain regulatory compliance and business resiliency are replacing traditional IT systems processes like computer imaging with intelligent packaging automation.

One of the most critical…


When surveyed, 46% of the top CEOs in the U.S. revealed that the primary drivers for their decision to integrate intelligent automation into digital transformation plans were: efficiency and quality.

Digital transformation is the efficient and productive use of technology, people, and processes to deploy quality improvements to fundamental business…


In our previous article, we highlighted vulnerability scanning and its importance within a vast and complex IT infrastructure. These vulnerability scans, as their name suggests, helps to identify system-based and/or network-based vulnerabilities that can be exploited by malicious actors.

Although operating merely as a detective control, vulnerability scans function in…


Today’s cybersecurity threat landscape is so vast and complex that it’s impossible to manage threats manually. Vulnerability management is a typical example: tech teams wrestle with many vulnerabilities across apps, networks, and endpoints.

A 2019 Kaspersky report outlines the size of the challenge. The security firm identified over 24 million…


Endpoint deployment and management is a constant IT headache, and it’s an obvious target for automation.

Until recently, automation for deployment and patch management has existed only for organizations privileged with the budget for technology and the highest levels of IT infrastructure engineering talent. Even those engineers only offer partial…


CISOs know that mitigating risk to maintain cyber hygiene often turns into a game of whack-a-mole. A threat emerges, the threat is mitigated — only for the next threat to emerge. It’s almost impossible to get to 100% effective mitigation but, of course, a consistent approach helps.

Cyber hygiene is…


As the long-term impact of the pandemic is emerging, so are the implications for healthcare IT support and delivery. CIOs at healthcare providers must stay abreast of these changes, which are, in some respects, an acceleration of existing trends. …

Aaron Mellman

Creator, Techy, Entrepreneur, Animal Lover, Ocean Enthusiast, Environmentalist

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store