Explore
Select a tab
26 results found
SSL Certificate Validity Changes 2025: How to Prepare Your Business Now
Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025
Strengthening Business and Cyber Resilience: The WWT and NetApp Partnership
In today's rapidly evolving digital landscape, businesses require technology partners that bring innovation, security and agility to the forefront. The partnership between World Wide Technology (WWT) and NetApp exemplifies this synergy, delivering next-generation solutions that align with NetApp's four key pillars for FY26: Modernization, Cloud, Cybersecurity and AI.
Blog
•Jul 14, 2025
Still Drowning in Your Data Lake?
Dear CIOs and CTOs, Congratulations! You finally convinced the board to invest millions in your data lake, and after only a decade of work, you've successfully centralized… well… a whole lot of unstructured sludge.
That single source of truth you promised? More like a single point of confusion.
And now — just as you're ready to sit back and bask in the glory of your petabyte-scale swamp — along comes something called agentic frameworks, and suddenly all that centralized data you've been hoarding seems about as useful as a dial-up modem at a 5G conference.
Let's talk about why it's time to reconsider your data strategy.
Blog
•Jul 14, 2025
The $2.3 Trillion Question: Why 84% of Digital Transformations Still Fail
Discover why most digital transformations struggle and learn practical strategies for success! This post explores how shifting from technology-first to business-first thinking can dramatically improve outcomes. Get actionable tips for aligning technology with real business needs and creating meaningful change that actually works.
Blog
•Jun 3, 2025
Wands at the Ready: Navigating Data Protection and Sovereignty
Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025
A CTO'S Primer on Q-Day: Part 1 - The Post-Quantum Problem
Quantum computing's potential to break current encryption standards, known as Q-Day, poses a significant threat to cybersecurity. As experts race to develop post-quantum cryptography, balancing the risks and revolutionary potential of quantum technology is crucial for safeguarding our digital future.
Blog
•Jun 24, 2025
MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown
In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024
The MITRE ATT&CK Framework: A Beginner's Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024
A CTO'S Primer on Q-Day: Part 2 - Post-Quantum Cryptography
Quantum computing threatens current encryption, urging immediate action from CISOs. As Q-Day nears, transitioning to post-quantum cryptography is crucial to protect sensitive data. Embrace hybrid cryptography, modernize inventories, and align with NIST standards to build resilience against quantum threats. Prepare today to secure tomorrow's digital landscape.
Blog
•May 28, 2025
A CTO'S Primer on Q-Day: Part 4 - The Impact on Global Enterprises
Q-Day, the impending quantum computing breakthrough, threatens to render current encryption obsolete, exposing sensitive data across industries. As cyber criminals prepare to exploit this, organizations must urgently adopt quantum-resistant measures. The race against time is on. Proactive adaptation is crucial to safeguard digital security and ensure resilience in a post-quantum world.
Blog
•Jun 24, 2025
The Time for Post Quantum Encryption is Now, Not Later
This post is not comprehensive of all encryption and data security practices, but it highlights the impending necessity for post-quantum cryptography adoption. We will take a brief look at why this is a current concern, who has this technology today and why we need to start adoption soon.
Blog
•Nov 11, 2024
Wiz Continues to Grow their Platform
Wiz announces new features for their platform, showing why it continues to be a leader in the cloud-native application protection platform (CNAPP) market.
Blog
•Aug 13, 2024