When it comes to network security, two names always come up in conversation: Cisco and Palo Alto Networks. Both are heavy hitters in the cybersecurity world, and if you’re trying to decide between the Cisco Secure Firewall and Palo Alto’s Next-Generation Firewall (NGFW), you’re definitely not alone. Let’s break it down in plain English—no jargon[…] Read
Your clients have likely used the same VoIP provider for years. It’s familiar. It works. So why change it? Because “good enough” isn’t enough anymore. With today’s distributed teams, growing security threats, and demand for unified tools, traditional VoIP systems are showing their age. In fact, Gartner predicts that by 2026, 75% of business voice[…] Read
On January 9, 2024, Windows Server 2019 officially ended mainstream support. While Microsoft will continue to provide security updates until January 9, 2029, the operating system isn’t receiving new features or bug fixes. What does that mean for you? Is it time to upgrade, or can you stick with Server 2019 while you focus on[…] Read
Published by Garrett Wiesenberg, Corsica Technologies
Your AI journey starts here. Artificial intelligence is transforming how businesses operate, compete, and grow. Whether you’re just beginning to explore AI’s potential or looking to refine your existing approach, developing a comprehensive AI strategy is essential for success in today’s digital landscape. What could AI look like for your business? Where can you leverage AI for[…] Read
The digital landscape is continuously evolving, prompting organisations to prioritise secure and efficient identity management systems. The rapid evolution, and occasional rebranding, of Microsoft’s Identity-as-a-Service (IDaaS) offerings can leave developers and architects a little confused. This article covers a few of the options of Microsoft Identity Management Solutions. What is IDaaS? Identity-as-a-service (IDaaS) refers to cloud-based solutions[…] Read
As an IT decision-maker, you understand the challenges of managing a complex technology environment. For example, when every department in your organization uses different hardware, software, and security protocols, IT becomes difficult to manage, troubleshoot, and scale. That’s why standardizing your IT stack is one of the smartest decisions you can make– a decision that[…] Read
A recent article in The Hacker News discussed the emergence of SOC 3.0—the latest iteration of the modern SOC (Security Operations Center). The SOC of the future will use sophisticated AI tools to detect and respond to threats at scale. Whether you use SOC as a service or run your own SOC internally, it’s essential to understand these[…] Read
Recently, during a web application penetration test, we uncovered a situation where a combination of seemingly small vulnerabilities led to a major security breach. We found a stored Cross-Site Scripting (XSS) flaw in the comments section of a support ticketing system. This, paired with weak session security, allowed us to hijack a user’s account. While[…] Read
Landlines and traditional PBX systems are going extinct and for good reason. Today’s businesses need more than just voice calling. They need a unified, secure, and cloud-native platform that scales with hybrid work and doesn’t drain IT resources. That’s exactly why Managed Service Providers (MSPs) are increasingly recommending Microsoft Teams Phone System to their small[…] Read
Penetration Testing Services 101 Are you easy to hack? That’s the big question. Yet many organizations don’t even know where their weaknesses lie. Penetration testing (AKA pen testing) solves this problem. This is a service provided by a company that specializes in cybersecurity and ethical hacking. The goal of the exercise is simple: Try to breach a[…] Read