Blindsided by VMware? How To Regroup and Come Out Ahead

If you’re one of VMware’s 500,000 customers, you have some decisions to make…quickly. VMware, now owned by Broadcom, recently announced it will no longer sell perpetual licenses (or related support) and will sell subscription licenses instead — which will cost customers significantly more in the long run. Most of Leapfrog’s clients use VMware products and …

Read more

Should You Hire or Upskill to Leverage AI?

Getting the business results you want from generative AI isn’t easy — there’s a definite learning curve. What’s the fastest way to get up to speed?  Information Week explores this issue in Hire or Upskill? The Burning Question in an Age of Runaway AI. Leapfrog is glad to weigh in — we’ve been enthusiastically helping …

Read more

Security and Maturity: Today’s CIOs Take Center Stage

About a decade ago, the CIO’s main goal was to oversee a team to manage the technology of a company and control costs. Annual IT initiatives often included finding ways to take something expensive — existing technology — and make it cheaper so that the budget could be used for other initiatives. Innovating or delivering …

Read more

Zero-Day Attacks and Zero-Trust: Clearing Up “Zero” Confusion

A zero-day attack can cripple a company. A “zero trust” strategy protects a company. But can a zero trust strategy prevent a zero-day attack that exploits a zero-day vulnerability? No, but it can help contain it. Let’s clarify any confusion caused by all these “zeros.” Zero…what? The article Stop Zero-Day Attacks With Zero Trust and …

Read more

Mass Tech Layoffs Are a Correction, Not the End of the Tech-Talent Shortage

There’s been a lot of talk about how big tech’s mass layoffs are easing the tech talent shortage. But the facts don’t show any change in the availability of qualified tech talent. Even when you combine all the layoffs over the past 18 months — Google, Meta, Microsoft, Amazon, Twitter, Lyft — the total is not significant …

Read more

Report Highlights Vulnerabilities That Put 30,000 Machines at Risk

Cybersecurity company Forescout has released a report detailing 56 very concerning security gaps they discovered across a string of devices used in industrial equipment, including devices used by manufacturers, distributors, and building automation. The devices were sold by 10 well-established operational technology (OT) vendors, including Honeywell, Ericsson, and Motorola, among others, and included products being …

Read more

Legacy Systems: The Preferred Path for Hacker Attacks

If your company has been relying on one or more legacy systems and they’ve run smoothly for many years, you may think they don’t need much attention — you can continue with SOP. But the opposite may be true. Organizations that fail to update and remediate vulnerabilities in their legacy systems are putting those systems …

Read more

SASE or SSE? There Isn’t a One-Size-Fits-All Approach to Security

In 2019, Gartner Research introduced a new enterprise networking and security category they called secure access service edge (SASE). SASE (pronounced “sassy”) combines a suite of both network and security services into a single, integrated cloud service. By bundling these services together, a single vendor can offer their customers better security and reduce the risk …

Read more

Don’t Fall for Phishing Scams: Hackers Use Voicemail Notifications to Infiltrate Systems

Hackers continuously search for creative ways to infiltrate company computers, and phishing is one of the most successful methods. Recently, cybercriminals have begun using phishing emails disguised as voicemail notifications to bypass organizations’ security measures and steal user Microsoft 365 and Outlook credentials. Efforts target companies across numerous sectors, including government, software security, healthcare, pharmaceuticals, …

Read more

Businesses with Legacy Platforms Embrace the Cloud by Taking Advantage of New Services

Gone are the days when running a legacy platform makes your company’s operations incompatible with the cloud. Even banks and other enterprises that are currently using mainframes can now migrate computing to the cloud, using services developed specifically to help them make the transition. Companies with legacy platforms running meaningful portions of their businesses may …

Read more