Many things happened over 2020, influencing our expectations and thoughts around 2021. The global pandemic caused an international shut down of many services and businesses, causing massive implications on every industry and every business. We learned a lot too, about our colleagues and ourselves. Many of us now work from home full time, a “perk” usually only offered to employees with higher tenure. The world didn’t stop spinning, however, and life kept moving forward. Welcome to the new year, 2021, and a new list of 5 Buzzwords we can expect to see.

Image for post
Image for post
Courtesy of Futuremakers

Artificial Intelligence

Every year. It seems like every year we…


Image for post
Image for post
Courtesy of lanner-america.com

Edge Computing In A Nutshell

The edge of a network is the place where traffic enters and exits a network. In many cases, this can be a modem or a router depending on a connection medium. Currently, when you access a service on the internet, your local device connects to your local network to your ISP, to the Internet backbone, then to a data center where the service is hosted. Traffic travels this path back and forth at fast speeds.

This is a great model for web browsing or basic internet use, but the distance from device to data center can be hundreds if not…


Managing a secure “environment” in a remote-focused workforce

Image for post
Image for post
Courtesy of pikrepo.com

Global Workplace Analytics estimates that “25–30% of the workforce will be working-from-home multiple days a week by the end of 2021.”

What is an “Environment”?

Before we dig into the depths of security, let’s define an environment. For our purposes, we will define an environment as a location and its surroundings. A network environment is a network of devices that communicate with one another and can route traffic to and from its boundaries. The surroundings of a network environment can be other devices, routers, switches, servers, tunnels, or more. …


Image for post
Image for post
Courtesy of Bechtle

According to the site Migration Monster, 1 in 5 corporate employees use at least 1 Office 365 product. This could be exchange, the Office suite, SharePoint, or maybe even just Teams. With the COVID-19 global pandemic, the Microsoft Teams global use has skyrocketed to 2.7 Billion minutes in meetings per day (Microsoft). These are incredible numbers, but the functionality of the Microsoft tool set goes well beyond Office 365. In this article, we are going to walk through some of my favorite services from the Microsoft Cloud.

A bit of background

The services mentioned here are in use with Microsoft E5, a subscription with…


Image for post
Image for post
Courtesy of Fornetix

Defending anything isn’t easy. From geopolitical borders to closely-held opinions, humans will defend that which is theirs or that which assists them in achieving a goal. To varying degrees, citizens, governments, and companies must all take a serious approach to their cyber-security practices. For this article, I will be focusing on companies.

According to the 2014 paper from Kholekile L. Gwebu and others, companies lose on average 22.54% in the following year after a data breach is announced. That number, the paper, nor does anyone else take into account the effectiveness or speed of the company’s incident response plan. All…


Image for post
Image for post

The shorthand term for “information technology” leaves a bad taste in your mouth sometimes, doesn’t it? I’m not referring to the technology used or even the people within the departments. Rather, I’m referring to the term used and the history that has cultivated under it. “Call IT” is a term many have said / heard over the years where computing has taken over within businesses and the need arose for specialists to service and build technology-centric solutions.

What is Modern IT? Forgetting the need for a rename (which still exists, but we will get back to that), what is different…


Image for post
Image for post
Courtesy of https://wallpapertag.com/wallpaper-linux-vs-windows

Images can contain a lot of data. Modern RAW files are the favorite of professional photographers for the data that is held within the files for better post-shoot adjustments. Steganography is the process of hiding data within an image file, and it is also not what we are discussing today (But for a great read regarding steganography, visit this article by Kevin Salton do Prado), rather we will be looking at hiding images as other data types.

In any investigation, no matter the context, it may become very important to find all images on a system or within a specific…


An introduction into Quantum Computing

Image for post
Image for post

The Quantum Realm

It may sound like an advanced technology from Star Trek, but Quantum Computing is alive and well in our modern world. Terms like Qubit and Super Position make the topic seem as if the concept is too advanced to understand, but the fact of the matter is anyone can work with a Quantum Computer. The use of quantum mechanics in modern computing services is a relatively new concept, yet the advancements made recently by companies such as IBM and others make the technology seem as well built out as other products and services.

A Q-What?

The quantum computer of today has a…


Smart Homes are all the rage today. With companies such as Nest, Ring, Phillips, TP-Link, Samsung, and others competing heavily to take control of your devices, it is important to have a system that can manage all different brands, across multiple wireless protocols, with full functionality and ease of use.

Image for post
Image for post

And why is everything about smart homes? With the right mix of administration, infrastructure, and planning, these solutions can be implemented into businesses such as retail stores or office parks.

This IoT Gateway Guide serves as a free tool to assist companies in utilizing the power of IoT Devices. Primarily…

Zach Griffin

Information and Cyber Security professional with a knack for all things cloud and networking| Boston, MA

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store