Hawaiki Cable Selects Peak 10 + ViaWest Hillsboro, Ore. Data Center as US Point of Presence for Subsea Cable to New Zealand and Australia
Peak 10 + ViaWest today announced that its Brookwood data center in Hillsboro, Ore. was selected by Hawaiki Submarine Cable as its US point of presence.
High-capacity network connectivity delivers premium performance, reliability and service delivery on a national basis
Mostly technical or logical in nature, security controls help to reduce risk to the environment and allow vulnerabilities to be addressed in a timely manner. Learn more in the fifth post of our security-focused series by Annalea Ilg, Peak 10 + ViaWest CISO.
In the fourth post of our security-focused series, Annalea Ilg, Peak 10 + ViaWest CISO, reviews the importance of cybersecurity risk profiles to outline a company’s known risks, policies and practices.
In the third post of our security-focused series, Annalea Ilg, Peak 10 + ViaWest CISO, discusses assessing security risk and how companies are struggling to keep up with security controls while reducing their risk.
There can be a lot of different reasons behind an attack. In this second post of our security-focused series, Annalea Ilg, CISO for Peak 10 + ViaWest, reviews some of the most common reasons we see.
The first post in a security-focused series written by Peak 10 + ViaWest CISO Annalea Ilg which covers risk assessment, security controls, security best practices and other topics to help you improve your security posture
The combined company is a leading national provider of Hybrid IT solutions with assets spanning 20 domestic and international markets.
Peak 10 Inc. announced that it has completed its acquisition of ViaWest. To learn more about the acquisition and combined company directly from Chris Downie and Nancy Phillips, view their video message.
Embedded systems security is nothing new and given the rise in the use of IoT devices at home and in the workplace, we established a penetration testing methodology that can be used to ensure at least some level of secure configuration and deployment of such devices.