Industry Insights

NCA's Tom Gobeille on Security, Industry Trends and Marketing Needs

NCA's Tom Gobeille on Security, Industry Trends and Marketing Needs
by Rob Savette

Rob Savette, Ethofy’s VP of sales and marketing, guest blogs today and delves into the world of cybercrime with Network Computing Architects.

I’ve known Thomas (Tom) Gobeille for a while now – he’s the president and CEO of Network Computing Archtitects, Inc. (NCA). Based in the Seattle suburb of Bellevue, NCA is one of the top security consulting firms in the industry, and they recently deployed Kurryer among their sales force. 

Happy New Masint!

Were Law Firms the First to Discover the Power (and Pitfalls) of Metadata?

Were Law Firms the First to Discover the Power (and Pitfalls) of Metadata?
By Cindy Ng

Were Law Firms the First to Discover the Power (and Pitfalls) of Metadata?Thanks to the NSA leaks , metadata has become a mainstream topic of conversation. Many of the less technically inclined are trying to make sense of it all. TV is not necessarily my go-to educational source for exploring new tech topics–I’m more of a Gigaom and, I confess, a Life Hacker person— but I then stumbled upon The Good Wife. It’s a show about law firms that, unlike most TV shows and movies, happens to get the technical details right. In one episode, the partners in the mythical Lockhart Gartner (LG) law firm display a deep understanding of the difference between metadata and the actual data content it describes. I was somewhat surprised by these geeky lawyers, but as I later learned, the legal sector has a reasonable claim to make for being early adopters of metadata technology.

Political Satirist Stephen Colbert as Closing Keynote at RSA Conference - 2014

Political Satirist Stephen Colbert as Closing Keynote at RSA Conference 2014
by Linda Gray

NCA recognized for outstanding achievement in customer satisfaction

Network Computing Architects (NCA) is recognized for outstanding achievement in customer satisfaction

‘Pony’ Botnet Gallops Off With 2 Million Passwords

 ‘Pony’ Botnet Gallops Off With 2 Million Passwords

By Gary Davis

From SIEM to Security Analytics: The Path Forward

From SIEM to Security Analytics: The Path Forward

by RSA Security

HIPAA’s Revamped Auditing Program: Will You Be Ready in 2014?

HIPAA’s Revamped Auditing Program: Will You Be Ready in 2014? 

by Andy Green

Creating a Business Continuity Plan

Creating a Business Continuity Plan

by Penny Larson

NCA Employees Lend a Hoping Hand

!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+'://platform.twitter.com/widgets.js';fjs.parentNode.insertBefore(js,fjs);}}(document, 'script', 'twitter-wjs'); lang: en_US

NCA Employees Lend a Hoping Hand
December 2013, Be
llevue, WA

The Security Impact of Shadow IT: December #SecChat

The Security Impact of Shadow IT: December #SecChat

Internet-wide Man in the Middle Attack

 By Corey Nachreiner

Lessons from the Government’s Cyber Crime Cases: Don’t Let Hackers ‘Own the Site’

Lessons from the Government’s Cyber Crime Cases: Don’t Let Hackers ‘Own the Site’

Posted by: Andy Green

Introducing Ethernet, 40 Years Later

Introducing Ethernet, 40 Years Later

Santa visits Children’s Hospitals using Cisco Video Technology

Santa visits Children’s Hospitals using Cisco Video Technology

Mike Haymaker
|  December 5, 2013 at 11:00 am PST

Public Safety Blog Series-Government Agencies and the Future of Mobility

Public Safety Blog Series-Government Agencies and the Future of Mobility

Patrick Finn
| November 22, 2013 at 6:13 am PST

Is There Something Phishy In Your Inbox?

Is There Something Phishy In Your Inbox?

By on Nov 20, 2013

Mobile WAN Optimization is Overrated

Mobile WAN Optimization is Overrated

Nov 2013  By   

Enterprise Dark Data Is a Hidden Asset

Enterprise Dark Data Is a Hidden Asset
By Andy Green

Backups are the Best Defense Against CryptoLocker

Backups are the Best Defense Against CryptoLocker

Why Anti-Virus Packages Aren't the Only Solution

Bernie Lambrecht Bernie Lambrecht    |    November 14, 2013

Outsourcing Rising: More Businesses Delegating IT

Outsourcing Rising: More Businesses Delegating IT

by Frank Grillo

Microsoft Office Leaves Users Open to Cyber Exploitation

Microsoft Office Leaves Users Open to Cyber Exploitation
By Gary Davis

Vulnerability Risk Management – It is a Big Deal

Vulnerability Risk Management – It is a Big Deal

Author: Steve Schlarman

Protect Your Data – or Pay the Price

 

Protect Your Data – or Pay the Price 
by Richard G. Twilley 

What is UC? An Intro to Unified Communications

What is UC? An Intro to Unified Communications

By

WAN Service Redundancy – Which Option is Best?

WAN Service Redundancy – Which Option is Best?

November 5, 2013 | By  

Video: 6 Steps to HIPAA Compliance



Video: 6 Steps to HIPAA Compliance

Everything You Wanted to Know About Cryptolocker…

 

Everything You Wanted to Know About Cryptolocker…

By Corey Nacreiner

Network Computing Architects Inc. (NCA) Rated “World Class” in Customer Satisfaction by Independent Source


Network Computing Architects Inc. (NCA) Rated “World Class” in Customer Satisfaction by Independent Source

Make Sure Your NDA Is Worth The Paper It’s Printed On

Make Sure Your NDA Is Worth The Paper It’s Printed On

Oct 24, 2013  By

Your Most Baffling Video Conferencing Questions…Answered!


Your Most Baffling Video Conferencing Questions…Answered!

Posted on October , 2013 by jsteele

10th Annual National Cyber Security Awareness Month

10th Annual National Cyber Security Awareness Month

A Blog a Day for the Month of October
Joseph (J.B.) Blankenship    |    September 26, 2013

Healthcare Providers Take a Shot in the Cloud

Healthcare Providers Take a Shot in the Cloud 

by Richard G. Twilley 

When It Comes to IT Challenges, You’re Not Alone


When It Comes to IT Challenges, You’re Not Alone
 by Mindy Powers

Vertexnet Botnet Hides Behind AutoIt

Vertexnet Botnet Hides Behind AutoIt

By on Sep 19, 2013

Breach Notification Gets Tweaked


And One More Thing about the HIPAA Omnibus Rule: Breach Notification Gets Tweaked

Posted on September 27, 2013  by

6 of 9 HIPAA Network Considerations

6 of 9 HIPAA Network Considerations
By: Terri Quinn, Cisco

What the Personalization of Work Means, or the BYOx Factor


What the Personalization of Work Means, or the BYOx Factor

By: Jack McCarthy, Content Manager, ShoreTel

Data Security Breaches: Case in Point


Data Security Breaches: Case in Point

 by R. Sobers

It’s Even Easier Now For Regular Folks To Conduct Cybercrime

It’s Even Easier Now For Regular Folks To Conduct Cybercrime

Banks Cash in with Big Data


Banks Cash in with Big Data

by Mindy Powers

HIPAA’s Teeth: What happens when you’re non-compliant?



HIPAA’s Teeth: What happens when you’re non-compliant?
Posted on August 8, 2013 by Rob Sobers

More Articles ...