Kevin Casey

Kevin Casey

Kevin Casey writes about technology and business for a variety of publications. He won an Azbee Award, given by the American Society of Business Publication Editors, for his InformationWeek.com story, "Are You Too Old For IT?" He's a former community choice honoree in the Small Business Influencer Awards. Find him on LinkedIn and Twitter.

| Follow @kevinrcasey

Kubernetes migration: 4 secrets to a smooth move

Kubernetes: best practices for migrating applications
What do successful Kubernetes migration projects have in common? A clear strategy, a strong culture, and the proper resources...

Kubernetes deployments: 6 security best practices

Kubernetes architecture for beginners
Experts share tips on improving the overall security of your software development and deployments – at the same time...

Remote security policies: 5 essential components

remote security policy
What are the key elements of a remote access policy? Experts explain how to update or create a remote...

Managing Kubernetes: 7 things you should understand

Ship's steering wheel to represent Kubernetes
Teams can run into problems when they treat Kubernetes as a magic automation wand rather than a tool that...

Remote work: 6 common misunderstandings about online security threats

remote work security best practices
VPN, cloud, and phishing misunderstandings show up in myths about security and remote work. Security experts break down the...

Kubernetes security: New tech, familiar attack vectors

Kubernetes
With Kubernetes, some old threat vectors may feel new again. Kubernetes security experts say misconfigured settings and privilege mistakes...

Laserfiche CIO: IT leaders play crucial role in pandemic crisis management

crisis leadership
Laserfiche CIO Thomas Phelps discusses the CIO's current role in business continuity and how his organization has morphed in...

How to maintain security when employees work remotely: 4 common challenges

remote work security best practices
Security fundamentals still apply. But your previous definition of human error probably didn't account for an employee helping kids...

Kubernetes architecture for beginners

Kubernetes architecture for beginners
Getting started with Kubernetes? Check out this quick primer on Kubernetes architecture basics and key facts to know at...

Remote security: 5 common myths about phishing scams

remote work security best practices
Phishing scams are rising in the time of COVID-19. With expert help from IT leaders and security pros, we...

Pages

x

Newsletter Sign-up

Stay on top of the latest thoughts, strategies and insights from enterprising peers.

Hybrid Cloud

CIOs: We welcome you to join the conversation