Masergy BlogTransforming Enterprise IT

Many organizations are starting to realize that their aging, on-premises call centers are adversely impacting their business. These systems are complex and costly to maintain. The inability of legacy call centers to provide users with easy access to...
February 15, 2017
Dean Manzoori
Severity: High A vulnerability, colloquially referred to as Ticketbleed vulnerability has been discovered in the TLS/SSL stack used by F5 Networks Inc. in their BIG-IP products. This vulnerability affects BIG-IP SSL virtual servers with the non-...
February 9, 2017
Craig D’Abreo
Unified communications are moving to the cloud — and fast. Driving this rapid growth is a long list of powerful benefits such as the move from a capital expense to a subscription model, and lower TCO through the integration of voice and data...
February 2, 2017
Dean Manzoori
Identity theft and tax refund fraud have been prevalent in United States for some time. Now that tax season is upon us, threat actors will increase their efforts to gain access to employee information on a company-wide scale through targeted...
February 2, 2017
Craig D’Abreo
Cybercriminals are becoming better organized and more sophisticated in their exploits. That’s causing enterprises to increase spending to protect their most valuable assets.
January 25, 2017
Mike Stute
The owners of Elasticsearch clusters began reporting on January 12, 2017 that their databases had been wiped and their indexes had been replaced by a single index demanding payment to a specified wallet in order for the user to recover the database...
January 13, 2017
Craig D’Abreo
Real-time collaboration that can be conducted across different channels of communications and devices will be a key focus of CIOs in 2017.
January 10, 2017
Dean Manzoori
Security decision makers are moving away from threat prevention to a mindset focused on advanced detection, rapid response and breach mediation.
December 9, 2016
Mike Stute
On November 29, 2016 a critical Firefox zero day exploit was disclosed on a Tor mailing list. The exploit targets a use-after-free vulnerability in Firefox’s SVG parser.
December 1, 2016
Craig D’Abreo
A growing number of organizations are beginning to look beyond technical criteria when selecting a WAN solution, emphasizing additional attributes that will ensure that their WAN is designed to be outcome driven and is as agile as the business.
November 30, 2016
Paul Ruelas

REQUEST A FREE CONSULTATION

 

Free Consultation