We offer decades of experience in technology solutions, combined with in-depth knowledge of the latest industry advances.
Case Study
The right formula for next generation firewall solutions. When a client needed a firewall to handle SCADA protocols in an Operational Technology (OT) environment, Lab as a Service was leveraged to test and report on these unique requirements—enabling the client...
Downloadable Resource
Enterprise-Firewall-Health-Assessment-1Download
Article
The Harvard Business Review conducted a study to understand how successful teams collaborate using file sharing technology. In general, they discovered the following fingerprints of successful team collaboration in the logs of their file sharing technology: Smaller teams are more successful.Research...
Downloadable Resource
Endpoint-Security-Assessment-1Download
Article
As problem-solvers, we like to think outside the box at Sayers. Sometimes, however, the best solution is inside the box. Hyperconvergence is one of those situations where you shouldn’t ignore the box, because the answer is there. A hyperconverged IT platform presents the...
Article
This week GitHub became the victim of the largest DDOS attack ever recorded due to a new amplification attack being observed in the wild. This attack, which did not require building a botnet or compromising any servers, was able to generate 1.35TBps...
Downloadable Resource
Sayers-Cybersecurity_-Cloud-Services-1Download
Article
Most of us working in Information Technology are aware of the Moore’s Law observation. A gross over-simplification would be to say the transistor density on an integrated circuit doubles about every two years (some quote 18 months), and as a...
Article
“Guardian, this is Rapier....three klicks southeast of target…Rapier is Oscar Mike. Radio silent. Over.” “Copy Rapier. This is Guardian. Out.” “Guardian, this is Rapier. Code worked. Rapier in the perimeter headed to target…..FRV in five. Over” “Roger. Out….” “Guardian, this...
Article
Everything you need to know about KRACK(Key Reinstallation Attacks) What is it? Mathy Vanhoef, a technical security researcher, found what we are now calling “KRACK” to be a devastating security flaw in the relatively “secure” standard for wireless networks WPA. KRACK allows...