Network Infrastructure

Cybersecurity lock digital abstract
By Christopher Frenz 10:59 am May 23, 2024
Cyberattackers have been shifting to strategies where legitimate tools commonly installed on desktops and servers are abused for malicious purposes. To fight back, knowledge is power.
Health system IT team members build custom software
By Glenn Fala 10:36 am March 22, 2024
So you've decided to build internally. Now what? Product management partnerships, devoted teams and future planning for technology refreshes will be key.
Two people examine screens with data displayed
By Paul J. Williams 10:27 am June 01, 2023
Common platform + standard infrastructure + unified support = reduced variability and increased predictability.
By Paul J. Williams 04:32 pm August 29, 2022
It's crucial we recognize that what worked well before may not work well today. And it's essential to anticipate, prepare for, respond to and adapt to incremental change.
By Michael Marshall 01:45 pm August 12, 2022
NGITS are versatile, adaptable infrastructures and engineering/operations that can incorporate new mission-advancing technologies and business processes into the enterprise as they emerge in a thoughtful, integrated way.
Person in a server room
By Christopher Frenz 10:49 am July 18, 2022
As an industry we've bought into the idea for too long that we can simply buy some cybersecurity tools and be safe.
Three arrows point upward and joining at the top point symbolizing integration
By Kevin Vigilante 10:48 am May 09, 2022
Too often, people think narrowly about integration, viewing it only in terms of making sure one system can talk to another. It must be far more than that.
By Paul J. Williams 03:27 pm May 03, 2022
While we can't afford to have redundancy in every situation due to budgets and application architectures, we can partner to understand the core technology needs and design to minimize downtime for business and clinical units.
By Seth Fogie 12:26 pm March 30, 2022
When implemented correctly, these programs can effectively crowdsource security research and testing services to help uncover real world exploitable vulnerabilities.
Person at computer screen
By Christopher Frenz 11:43 am February 02, 2022
While compliance-based frameworks are not without merit, it is important that they be viewed as minimum acceptable standards and not as end goals.