Kathy Coe

Behind the Firewall – The Insider Threat, Part 2

As you read in Part 1 of this article, some of the most devastating threats can come from insiders. "Insiders," as we have defined them, include anyone with access...

Behind the Firewall – The Insider Threat, Part 1

Your security program is only as strong as its weakest link, and that is where the human element comes into play. Even if you have very comprehensive IT security...

Latest Posts

American Connection Project Aims To Fill The Gaps In Rural Broadband

In the cloud era, digital connectivity is clearly a necessity. Yet many rural communities across the U.S. still lack this necessity, including farmers, who...

Predicting Cloud Trends for 2022: Migration, Multicloud and ESG

If you look to where cloud computing is likely heading in the year ahead, three key trends emerge, trends that span both technology and...

What Is Edge Computing? Why It’s Important and How It Works

In a nutshell, edge computing is any computing that occurs on the edge of the network rather than in a centralized server. If you dig...

Industry Analyst Michael Krigsman on Digital Transformation

I spoke with Michael Krigsman, analyst and founder of CXOTalk, about the evolution of digital transformation, and why the challenges for cloud native companies...

New Relic’s Bill Staples on Why Observability is Gaining Adoption

I spoke with Bill Staples, CEO of New Relic, about the value of observability, and why the challenges of managing today’s infrastructure makes it...