Cyber Attacks on Critical Infrastructure A Historical Timeline

| September 3, 2019

article image
This decade began with an event that, like 9/11, sent the message of something changing in a way we knew could never go back. Since the Pandora’s box of the Stuxnet virus, we have seen numerous attack variations that have demonstrated how these threats can manifest themselves into serious, sometimes massive, costly damage.

Spotlight

Onepath LLC

In a world of complicated systems, tight deadlines, daunting scale, unexpected setbacks, human error, new technologies, and limited resources… someone had to make the hard things easier for the client, the client’s client, the technicians, and everyone else.

OTHER ARTICLES

Data Security in the Cloud Best Practices

Article | April 8, 2020

Data security in the cloud best practices include: understanding and implementing security fundamentals, securing cloud infrastructure along the shared responsibility model, encrypting data in the cloud, and ensuring compliance with applicable regulations. Data security fundamentals often come back to the CIA Triad: data confidentiality, data integrity, and data availability. The shared responsibility model refers to the idea that both a cloud provider and the organization using the cloud are responsible for ensuring the overall security of the organization’s cloud infrastructure, including the data housed there.

Read More

Supercharge your next tech project with virtual co-creation

Article | March 31, 2020

You know your business inside and out. You’re aware of its IT needs and challenges, and you want to take advantage of state-of-the-art technologies. Perhaps you’re looking to get supercharged on the latest tech trends and see how to employ them in your organization. What if your IT team could join forces with infrastructure specialists to co-create enterprise-scale solutions quickly? Co-creation is the concept of generating shared business value through partnership between a company and its customers. It can be used to brainstorm new products or services, solve problems or boost performance. In the IT industry, businesses might co-create IT solutions by working together to identify potential projects, define their scope and chart a plan for implementing them.

Read More

Graph machine learning in distributed systems: What you need to know

Article | March 16, 2020

Just as graphs make it easier for us to understand and act on complex data, graph machine learning can take graph theory a giant step further. But can it even help today’s service providers to improve reliability and predict anomalous behaviors in complicated distributed systems? Find out below…How much do you know about graph representation of data? Over the last two decades, graph theory has become increasingly popular in both research and industry. Among other areas, it has been used in epidemiology, medicine genetics, healthcare, banking and engineering to solve challenges such as routing, finding relation, path etc.

Read More

How to Scale IT Infrastructure

Article | April 25, 2020

IT infrastructure scaling is when the size and power of an IT system are scaled to accommodate changes in storage and workflow demands. Infrastructure scaling can be horizontal or vertical. Vertical scaling, or scaling up, adds more processing power and memory to a system, giving it an immediate boost. Horizontal scaling, or scaling out, adds more servers to the cloud, easing the bottleneck in the long run, but also adding more complexity to the system.

Read More

Spotlight

Onepath LLC

In a world of complicated systems, tight deadlines, daunting scale, unexpected setbacks, human error, new technologies, and limited resources… someone had to make the hard things easier for the client, the client’s client, the technicians, and everyone else.

Events