Latest Guidance for Ongoing Cyber Attacks in Ukraine
![Latest Guidance for Ongoing Cyber Attacks in Ukraine Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2022/03/AspireMDR_Security_Advisory_Hero_Social.png)
Latest Guidance for Ongoing Cyber Attacks in Ukraine
By Aspire Security Operations Center (SOC) Team INTRODUCTION In the past 20 years, there has been a massive shift in geopolitical conflict from traditional kinetic, “symmetric” warfare to what is now known as “asymmetric” warfare. Asymmetric warfare refers to conflicts between smaller factions and larger nation states, or groups that have disparate capabilities and strategies.1 […]
![Trust Nothing Until Proven Trustworthy Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2022/02/AI-CyberSecurity-Teaser-3-800x455-1.png)
Trust Nothing Until Proven Trustworthy
The Case for Zero Trust Infrastructure By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Zero trust is a concept that has been around for some time but gaining momentum as many organizations are starting to take the approach more seriously. It addresses the challenges of today’s business, including securing remote workers and hybrid […]
![Solving the Remote Work Cybersecurity Conundrum Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2022/02/AI-CyberSecurity-Teaser-2-800x453-1.png)
Solving the Remote Work Cybersecurity Conundrum
The decentralization of workers By John Rossiter, Principal Consulting Engineer, and Chief Information Security Officer When the pandemic forced companies to suddenly shift to remote-work solutions, many employees started to use personal computers and other non-corporate devices, creating substantial security issues still under-addressed. Even when employees use company-provided computers and laptops, many users admit to […]
![Malicious Until Proven Innocent Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2022/02/AI-CyberSecurity-Teaser-1.png)
Malicious Until Proven Innocent
Today’s Threat Landscape and its Impact on Operations By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners On a recent episode of the Digital Aspirations in Business podcast, we discussed the current threat landscape and strategies organizations can take to solve the unique cybersecurity challenges. Here is one part of the discussion. Cybersecurity threats […]
![Top Benefits of a Cloud-Based Firewall Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2021/11/Cloud.png)
Top Benefits of a Cloud-Based Firewall
By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Firewalls are one of the most fundamental methods of defense IT security professionals use to protect against attackers. At its most basic, a firewall serves as a gate between your network and the open internet. How secure that gate depends on the features your firewall […]
![How To Strengthen Your Organization’s Malware Defense Program Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2016/03/event-1.jpg)
How To Strengthen Your Organization’s Malware Defense Program
Security Solutions Architect Michael O’Connell provides an overview of how to strengthen your organizations’ Malware Defense Program with Cisco Umbrella Secure Internet Gateway By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Today’s threat landscape is a dynamic, ever-expanding, formidable challenge for businesses of every kind. This has been exacerbated by the COVID-19 pandemic […]
![Top 5 Ways to Prevent Ransomware Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2019/02/shutterstock_581478139.jpg)
Top 5 Ways to Prevent Ransomware
By Robert Lesher. Pre-Sales Solutions Engineer and Michael O’Connell, Security Solutions Architect If you logged onto the internet in the past year or so or even turned on tv you know that ransomware attacks are happening every day. In May, the Colonial Pipeline was attacked and in the same month databases for a San Diego […]
![How to Deploy HyperFlex Edge (When You Can’t Access the Internet) Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2021/09/How-to-Deploy-Hyperflex-Edge.png)
How to Deploy HyperFlex Edge (When You Can’t Access the Internet)
By Jeff Kamen, Data Center Senior Delivery Engineer, Aspire Technology Partners The Problem Statement How does one deploy Hyperflex Edge when you cannot access the Internet? HyperFlex Edge has quickly become the go-to solution for remote hyperconverged solutions. The ability to deploy a Cisco HyperFlex Edge at remote locations using Intersight makes HyperFlex Edge that […]
![Transformational Applications of Private LTE & 5G for the Secure Modern Network Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2021/08/Transformational-Applications-of-5G-for-the-Secure-Modern-Network.png)
Transformational Applications of Private LTE & 5G for the Secure Modern Network
By Greg Frasca, Digital Solutions Consultant and Cody Harris, Director of Digital Architectures, Aspire Technology Partners In today’s modern network, user engagement and data transfer happen at the edge. This includes the internet of things (IoT), mobile applications, remote patient monitoring devices, distribution line-workflow automation, and smart cities with municipalities leveraging data from connected roadway […]
![Six Targets to Keep on Your Cybersecurity Radar Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2021/08/Six-Targets-to-Keep-on-Your-Cybersecurity-Radar.png)
Six Targets to Keep on Your Cybersecurity Radar
By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners There are six targets that CISOs and CIOs need to keep on their Cybersecurity Radar with the aggressive stance of cybersecurity threats and attacks becoming stronger and bolder. As if the past year and a half hasn’t provided enough challenges for businesses to keep […]
![Introduction to Cisco SD-WAN Configuration Templates Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2021/06/Intro-sd-wan-templates.png)
Introduction to Cisco SD-WAN Configuration Templates
Written by Rio Zavarace, Principal Consulting Engineer, Aspire Technology Partners Introduction: Facing SD-WAN as a Route-Switch Cisco Engineer There is a point in time when many route-switch Cisco engineers face SD-WAN. After living the CLI lifestyle for so many years, a centralized, GUI-based approach brings a different way of deploying configurations to routers. The purpose […]
![7 Tips You Should Know Prior to Implementing Cisco SD-WAN cEdges Featured Image](https://www.aspiretransforms.com/wp-content/uploads/2021/06/7-tips-sd-wan-white-paper.png)
7 Tips You Should Know Prior to Implementing Cisco SD-WAN cEdges
Written by Rio Zavarace, Principal Consulting Engineer, Aspire Technology Partners Introduction If you are a seasoned Cisco engineer with knowledge of and experience with Dynamic Multipoint VPNs and/or iWAN, and you want to get started with Cisco SD-WAN with cEdges (IOS-based SD-WAN routers), this paper may be for you. In this post, I will summarize […]