Scott Hogg

Scott Hogg is the CTO for Global Technology Resources, Inc. (GTRI). Scott has been a network computing and security consultant for over 20 years. He has a B.S. in Computer Science from Colorado State University, a M.S. in Telecommunications from the University of Colorado, along with his CCIE (#5133), CISSP (#4610), among many other vendor and industry certifications. For the past 14 years Scott has been working with IPv6 technologies. Scott is the author of the Cisco Press book titled "IPv6 Security" and he has given numerous presentations and demonstrations of IPv6 technologies. He is also currently the Chair Emeritus of the Rocky Mountain IPv6 Task Force and part of the Infoblox IPv6 Center or Excellence.

6 network and security trends you can expect in 2017

6 tips for buying or selling a smart home

6 tips for buying or selling a smart home

Recently, one of our neighbors sold their home and they had a Google Nest thermostat. This became an issue during the sale process. The prospective buyers wanted the Nest to remain, but current owners wanted to take it with them. ...

A dozen extensions to TCP/IP that optimize internet connections

A dozen extensions to TCP/IP that optimize internet connections

This article will break down new Internet Protocol optimizations and show which ones are most impactful for your organization and can improve your internet application experience.

5 reasons to move to an SD-WAN

5 reasons to move to an SD-WAN

Software-defined WANs can save money and improve network performance.

Resources abound to make cloud services more secure

Resources abound to make cloud services more secure

Cloud security training and certification are easily available from many trusted sources.

ARIN Finally Runs Out of IPv4 Addresses

ARIN Finally Runs Out of IPv4 Addresses

IPv4 Address Cupboards are Bare in North America

Is an SDN Switch A New Form of a Firewall?

Is an SDN Switch A New Form of a Firewall?

Many people anticipated that enterprise organizations would adopt Software Defined Network (SDN) technologies later than service providers or multi-tenant data centers and cloud service providers.  We are now seeing more use of...

Annual Security Reports Predict What We Can Expect in 2015

Annual Security Reports Predict What We Can Expect in 2015

Recent security reports give insight into security best practices often missed.

SDN Security Attack Vectors and SDN Hardening

SDN Security Attack Vectors and SDN Hardening

As enterprises look to adopt Software Defined Networking (SDN), the top of mind issue is the concern for security. With the introduction of SDN, new strategies for securing the control plane traffic are needed. This article will...

OpenFlow Supports IPv6 Flows

OpenFlow Supports IPv6 Flows

Software Defined Networking systems are gaining IPv6 capabilities

Promise Theory

Promise Theory

The way we have created IT systems over the years has been very linear with each individual component being statically configured. If a human makes an error in any one of the many configurations, then the whole system breaks down. ...

Software Containers: Used More Frequently than Most Realize

Whether you have considered trying to secure an application by putting it into a “sandbox” or wondered how a Software as a Service (SaaS) provider keeps your application and data isolated from other customers, you have been...

Load More