Articles by Joe Stanganelli 

Patchy Patching: IT Pet Peeves, Part 4

Poor patching practices top our list of IT pet peeves, and for good reason. They lead to massive security risks.

End User Goofs and Who's to Blame: Top 10 IT Pet Peeves, Part 3

End users are guilty of committing several IT pet peeves, but whose fault is that? Let's talk servers in sinks and temps with admin access.

Disorganized Datacenters and Bad GUI: Top 10 IT Pet Peeves, Part 2

What drives network engineers mad? Let's talk about bad cable management and worse GUIs.

Top 10 IT Pet Peeves, Part 1

What common mistakes make life harder in the IT trenches? Joe Stanganelli investigates.

Cloud Security FUD Drives Genomics Industry towards Cloud-in-a-Box, Part 2

Accessibility and cloud security concerns push development of on-premises cloud alternatives for the life sciences and genomics industries.

Cloud Security FUD Drives Genomics Industry towards Cloud-in-a-Box

"Anti-cloud" appliances help the life sciences and genomics overcome compliance, cloud security, and data accessibility concerns.

Drones Exploit Wi-Fi to Threaten Security

A common Wi-Fi setting renders smartphones and other wireless devices vulnerable to exploits by specialist drones.

The Mask Raises Network Security Worries in an Age of Cyberwarfare

The Careto malware, a.k.a. The Mask, could have been a Duqu-like cyberweapon – but more sophisticated.

Mistrial Resolves Nothing in Juniper-Palo Alto Patent War

After judge declares a mistrial in Juniper/Palo Alto Networks patent trial, Joe Stanganelli examines what happened, and what happens next.

What's at Stake in the Juniper vs. Palo Alto Networks Patent Trial

Judge calls patent dispute between Juniper and Palo Alto Networks "a classic battle of the experts."

'Twas the Night Before Christmas (In the Data Center)

A little magic comes to the data center on Christmas Eve.

Data Breaches and NSA Backdoors: A Legal Primer

NSA backdoors make you more vulnerable to data breaches and their legal ramifications. Joe Stanganelli discusses liability in the event of a data breach.

They Want Your Enterprise Brains: Night of the Botnet of Things

The Internet of Things comes with a security downside that can't be ignored.

Protect Against NSA Backdoors in Networking Gear

Has the NSA built a backdoor into your enterprise's networking stack? Learn the dangers and how to protect your enterprise's sensitive data.

Reconnecting the CIO and the CMO

A disconnect exists between IT and other offices within the enterprise. Here are some strategies for CIOs to bridge the gap and strengthen IT's position within organizations.

The Tao of Xen

Donating the Xen hypervisor to the Linux Foundation may help Citrix gain ground in the cloud wars.

Get the Latest Scoop with Enterprise Networking Planet Newsletter