Robin Bond

Creator of audience-focused content for B2B. Driven by data, designed for impact. 

This is not a dress rehearsal: What critical infrastructure owners and operators can do right now to defend against nation-state threats

Grid modernization has created a complex ecosystem of network-connected equipment, exposing utilities to a wide range of potential threats from nation-states, criminals, disgruntled employees, and accidental misconfiguration. The energy sector is particularly vulnerable to cyberattack because core cybersecurity strategies—like the use of SPAN ports to direct bulk network data to security analysis systems and physical air gaps to separate the Operational Technologies (OT) network from the rest o

5 Questions to Ask When Choosing an RPO for CMMC Compliance

In January 2020, the Department of Defense (DoD) announced a new compliance framework called the Cybersecurity Maturity Model Certification (CMMC). Designed to protect Controlled Unclassified Information (CUI) from falling into the wrong hands, CMMC applies to all 300,000 businesses across the DoD supply chain. Every contractor and subcontractor must be CMMC-certified by 2026, or they will be barred from bidding on any DoD contract. That said, many Requests for Proposal (RFPs) already require bi

Surviving the Semiconductor Chip Shortage: A New Reason to Move to the Cloud

A new reason to move to the Cloud In case you haven’t heard, there’s a semiconductor chip shortage. Its impact is being felt deep and wide by just about every industry globally. An essential component of manufacturing for, well, everything is the computer chip. From the automobile industry, where the semiconductor shortage is driving up the demand for used cars, to the mobile and wireless sectors, which have scarcely recovered since the COVID-19 drove up demand for home technology, the worldwid

Planning Ahead: Incident Readiness vs. Business Continuity

Is your organization prepared? Cyberattacks on small and medium businesses (SMBs) are becoming more impactful and frequent thanks to bad actors around the globe, and that’s not all. Business interrupting data incidents are rising via insider attacks, corporate espionage, volatile weather events, and more. From costly downtime to business shutdown, SMBs pay the price for unchecked incidents in the form of dollars, lost market share, damaged reputation, or worse, complete loss of business. From m

Why Aren't More SMEs Using Multi-Factor Authentication?

Cyberattacks against companies large and small are on the rise as hackers engineer new ways to access and steal data. From ransomware to Distributed Denial of Service (DDoS), two facts are particularly concerning: • Leveraged credentials, most often passwords, cause sixty-one percent of data breaches. • Nearly half of all cyber-attacks target small and medium-sized enterprises (SMEs) who are less equipped to recover from damages. Because SMEs inherently lack the cybersecurity resources of large

5 Emerging Procurement Trends That Are Here to Stay

5 Emerging Procurement Trends That Are Here to Stay The COVID-19 pandemic wreaked havoc across trade, education, government, healthcare, and more. And within almost every industry, the procurement department was left to solve unsolvable problems. Long-standing systems for balancing supply and demand fell apart, most visibly in the lack of personal protective equipment (PPE) that frontline healthcare workers needed to protect themselves and others during the crisis. In non-healthcare fields, ma

4 Business Considerations for Creating an Edge Strategy

The well-storied “data deluge” is driving enterprises of all sizes and industries to move critical applications and workloads to the “edge” of their network infrastructure where data can be acted on immediately. Driven by the proliferation of 5G, IoT and AI, as well as a flood of new devices enabling all that connectivity, industry experts expect the global edge market to grow from $1.17 billion in 2016 to USD $6.73 billion by 2022. Edge computing enables efficient data processing near the sou

Who Needs CMMC Certification? 3 Things to Know

If you’re doing business with the Department of Defense, you’ve likely heard about the upcoming CMMC certification requirement and wondered, “Will my organization require certification?”. The short answer is yes, with a few caveats. Below, we outline three things to know. Attacks against the defense industrial database (DIB) are growing in numbers and sophistication in the form of ransomware, phishing, and state-sponsored attacks. Increasingly, malicious actors access Controlled Unclassified In

7 Components of an Edge Strategy

If you’re a CEO, CTO or CIO moving your enterprise toward edge computing, you’re not alone. A 2020 IDC survey found that by 2023 over 50% of new infrastructure will be deployed at the edge. You’re likely aware by now of the benefits of—and virtual necessity for—an edge strategy. A global data tsunami is being fueled by IoT everywhere, emerging 5G technology and a flood of mobile devices enabling all that connectivity. By enabling the deployment of data as close to the consumer as possible, edge

Balancing Data Resiliency with Data Recovery

Note: This is Blog 2 in our 5-part series on disaster recovery. Click here to read , “Every season is hurricane season when it comes to protecting your data” Downtime caused by man-made and natural IT disasters costs an organization an estimated , and that doesn’t include losses of productivity, and market share. Further, a recent University of Texas study revealed that 94% of companies that lose their systems for 10 days or more due to a disaster don’t survive: 43% are forced to close immediat
Load More Articles