How To Get Your CISSP: Part 2

For those new to this series, 3 Tree Tech CTO, Eric Skeens has decided to document every step of the journey to better shed light for IT nerds and executives. For those wondering how to get your CISSP, check out…

Keep Reading
people working in high tech facility with white type that says 'the 4th industrial revolution is here'
Is COVID-19 The 4th Industrial Revolution Catalyst?

Even though many believe 2015 or 2016 started the 4th Industrial Revolution, I believe history will look at 2020 as one of the most transformative years in our history. COVID-19 didn’t just impact virtual meeting adoption but has pushed technologies…

Keep Reading
35% of Enterprise Employee Data Is On The DarkWeb.

The dark web is a rich resource for internet scoundrels peddling stolen information, but have you been curious how much of your employee’s data is exposed or how to search the dark web to begin with? You may believe having…

Keep Reading
How To Get Your CISSP

As our own CTO, Eric Skeens goes after his CISSP, he has decided to document every step of the journey to better shed light for IT nerds and executives. For those wondering how to get your CISSP, resources available, and…

Keep Reading
Covid-19 Tracking Tech, Capabilities, Faults and Future Uses

Camera systems have been widely used for security and production line monitoring for quite some time, but now surveillance is being used to minimize infections and safeguard the workplace. But best-in-class Covid-19 tracking systems I’ve researched aren’t just beneficial for…

Keep Reading
Making Phone Calls In Teams

UPDATE: Edits to the original article were made due to Microsoft’s announcement of its intent to acquire Metaswitch Networks. Microsoft has rebranded previous communications and collaboration platforms to Teams, and executives are already pushing their IT groups to figure out…

Keep Reading
Over the Horizon
How can 150 Million in DARPA research improve your security posture?

As our team was researching the DOD’s big 700 Million RFP for their 20 Combat centers, we learned the requirement that all security vendors selected must send their logs to a specific artificial intelligence/machine learning (AI/ML) driven NextGen SIEM. Intrigued,…

Keep Reading
Our Work From Home IT Transition Plan & No-Cost Support

With Covid-19 concerns, employer’s work from home directives pose a major challenge for CIOs and CTOs from a technological standpoint. Do not panic. In addition to activating a 24/7 chat system at the bottom of the page that goes directly…

Keep Reading
Does T-Mobile 5G Deliver Real 5G Speeds?

The end of 2019 saw multiple announcements around 5G deployment from all of the major wireless carriers, most recently with Verizon’s 5G Superbowl Camera, but the nationwide rollout of T-Mobile 5G is the most impressive, at least on the surface….

Keep Reading
Cybersecurity’s Focus On Prevention Is A Vulnerability

Can hacking be stopped? As the conventional cybersecurity industry focuses on prevention, their profits reach into the billions and hacker profits exceed the illegal drug trade. CIO and CTO leaders are conditioned to accept they will be hacked, shelling out…

Keep Reading