Forget Apple & Amazon — Microsoft’s Ecosystem is the Real Power Player for 2030At the heart of Microsoft’s resurgence lies its cloud platform, Azure. Initially playing catch-up to Amazon Web Services (AWS) , has…Dec 20, 2024Dec 20, 2024
The CrowdStrike Outage: What it Reveals About Our Overreliance on Cloud and SaaS SystemsOver the past 10–15 years, there has been a significant shift in reliance on cloud services, SaaS, and connected environments. Previously…Oct 10, 2024Oct 10, 2024
The AI Gold RushOrganizations that have invested in structuring their data and strengthening their IT infrastructure and networking setup over the last 5…Aug 21, 2024Aug 21, 2024
Stop Scrolling, Start Listening: Podcasts That Will Make You SmarterPodcasts offer a convenient and engaging way to acquire knowledge and insights from industry leaders and experts. They are another option…Aug 21, 2024Aug 21, 2024
Ditch Micromanagement, Unleash Your Team’s SuperpowersMicromanagement breeds fear, anxiety, and distress, turning even the most talented individuals into skittish shadows of their former…Dec 18, 2023Dec 18, 2023
How Cybersecurity Can Hinder Business Progress and Lead to Customer LossCybersecurity: A Business Enabler, Not a BarrierSep 11, 2023Sep 11, 2023
FREE ONE MILLION COURSES & EXAMS: Certified in Cybersecurity professional program offered by ISC²The Certified in Cybersecurity certification offered by (ISC)² (International Information System Security Certification Consortium) is a…Jul 6, 2023Jul 6, 2023
The Bandwagon Effect: Reconsidering the Abandonment of Remote WorkThe shift to remote work during the pandemic opened our eyes to a new way of working, one that eliminated the daily commute and provided…Jun 26, 2023Jun 26, 2023
Beyond Dictation: Why Technical Expertise is Critical in IT Projects and ProgramsIn today’s fast-paced technological landscape, the success of technology projects and programs heavily relies on the integration of…Jun 13, 2023Jun 13, 2023
The Most Important Zero Trust Networks Success FactorsZero trust architecture was first introduced more than a decade ago by John Kindervarg — an analyst at Forrester Research Inc.. Its…Sep 5, 2022Sep 5, 2022
Security Operations Centre: A Simple (But Complete) GuideThe sustained increase in cyber attacks and security breaches, combined with a shortage of cyber security professionals, adequate tools…Aug 1, 2022Aug 1, 2022
How to Get Ahead in Vulnerability ManagementAs organisations rely more on technology and expand their online presence they are getting exposed to more vulnerabilities. As the number…May 24, 2022May 24, 2022
Succeed with BUILDING A SECURE NETWORK AND REMOTE ACCESS like GoogleRemote access to corporate networks are in demand now more than ever. Some organisations operated remote working even before Covid times…Feb 28, 2022Feb 28, 2022
Setting Strategy & Building IT InfrastructureA few years ago I was engaged in a work task to build a technology strategy for the organization. This involved upgrading a few pieces of…Jan 10, 2022Jan 10, 2022
It is not over yet for MPLSThere will still be some time before we completely see MPLS disappearing from enterprise…Apr 6, 2021Apr 6, 2021
Are Consumers Winning in the Streaming Wars?By Aravinda Samarasinghe & Jason PiccininFeb 22, 2021Feb 22, 2021
Productise Network InfrastructureThis “click of a button” process will be the face of the number of things that flows behind the scenes, from ordering network links to…Oct 26, 2020Oct 26, 2020
Cyber Security — Invest, Implement, ImproveToday, the information technology that helped the world to advance has created a new set of challenges. It has introduced a whole new set…Aug 17, 2020Aug 17, 2020
An Extract from “The Regular Effect” by Shiv RadhakishunOver the past six weeks, the world has turned into a different place. Regular ways have changed in many instances. Either they have…Apr 27, 2020Apr 27, 2020
Working RemotelyIn the wake of the current situation around the world there are many obstacles that we are looking to overcome. Organisations are…Mar 24, 2020Mar 24, 2020