The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.
A revolution is upon us. For the first time in the history of computers, the speed of storage has caught up with the rate of the computing resources that use that storage. Up until this moment, storage has always been the bottleneck. Although your computer can store some information in its primary memory, known as RAM, this storage has a physical limit. Past that limit, you'll need to read data from a secondary storage device such as a hard disk, which is a much slower process. If you've ever tried to copy a file from an external device onto your computer, for example, you'll notice that it takes much more time than opening a file that's already stored in your computer's memory.
With Hewlett Packard Enterprise's recent announcement that it will soon be bringing the ground-breaking InfoSight technology to its 3PAR StoreServe, the value of HPE's recent acquisition of Nimble Software is more clear than ever. The move means InfoSight will soon be available across a full portfolio of HPE data solutions: from systems for small businesses all the way up to the largest enterprises. This makes HPE’s storage portfolio the most complete in the industry. Since InfoSight learns by analyzing data from its installed base, it's about to get a whole lot smarter.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Post-season college basketball is in full swing, and as a sponsor of UConn Athletics, it’s something we get very excited about. Of course, we also get pretty revved up about layered cybersecurity pretty much any day of the week. Watching so much hoops this time of year, we’ve noticed that the principles of a good cybersecurity defense are reflected on the basketball court.
Improving record keeping and data handling is critical to keeping the trust of partners, vendors, contractors, and customers. The importance is magnified when the federal government is involved, with the goal of creating a national culture of cybersecurity that protects the information of our businesses, citizens, and government. The National Institute of Standards and Technology (NIST) created Special Publication 800-171 to help protect Controlled Unclassified Information. But what does that actually look like? How will you know you’re meeting the standards laid out in NIST 800-171? What is CUI?
During tax season, personal information is being exchanged at a much higher rate than any other time of year. Documents like W2s with Social Security numbers on them are just par for the course. It’s also a time of year when employers and employees engage in tax-related tasks that aren’t routine to them. There’s often a bit of chaos getting everything in order and even a bit of anxiety over doing it right. For hackers and scammers who rely on human error and deception, all of this combines to create ideal conditions. I was recently on WTNH’s Good Morning Connecticut alongside Michelle Seagull, Commissioner of the CT Department of Consumer Protection talking about tax hacks and scams targeting companies in Connecticut. Commissioner Seagull and I were also guests on the MetroHartford Alliance’s “Pulse of the Region” radio show with Brian Newman from CohnReznick discussing this same topic.
As business operations are increasingly conducted online, businesses in all industries are becoming more susceptible to cybersecurity breaches. I was recently invited to discuss cybersecurity concerns and best practices for real estate agents on Real Estate Radio, a show broadcast on CBS Radio 94.9FM here in Connecticut and hosted by One and Company Real Estate’s Byron Lazine and financial planner Pat Kenny. Our discussion wound up being quite universal and applicable to almost any industry. Here are some of the highlights of my interview with Byron and Pat. Below, you’ll find the full transcript and audio of the conversation.