Rich Banta

Opinions expressed by ICN authors are their own.

Rich Banta, co-owner, is responsible for compliance and certifications, data center operations, information technology, and client concierge services at Lifeline Data Centers, a leader in data center compliance, excellence and innovation. Rich has an extensive background in server and network management, large scale wide-area networks, storage, business continuity, data center design and data center operations.

Rich is a former CTO of a major health care system, and he is hands-on every day in the data centers. He also holds many certifications, including: CISA - Certified Information Systems Auditor, CRISC - Certified in Risk & Information Systems Management, CDCE - Certified Data Center Expert, CDCDP - Certified Data Center Design Professional, and CTIA - Certified TIA-942 Auditor.

The opinions expressed in this blog are those of Rich Banta and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Public vs. private cloud: Why the public cloud is a real threat to security

Beyond logging: Using SIEM to combat security, compliance issues

Beyond logging: Using SIEM to combat security, compliance issues

Perimeter security simply isn't enough anymore. We need a holistic view of our IT infrastructures; SIEM provides that.

FedRAMP: A challenging path to operational excellence for cloud providers

FedRAMP: A challenging path to operational excellence for cloud providers

FedRAMP certification is a must to win any government cloud hosting contract, but it is far tougher to achieve than most cloud providers anticipated.

When your IT department goes rogue

When your IT department goes rogue

In my last post, we discussed the latest habit of non-IT departments in organizations large and small: hatching rogue IT operations on the cloud, taking your company’s data for a spin in the Wild, Wild Web — unpatched, unprotected,...

The new Rogue IT: A growing, invisible threat to your IT operations

The new Rogue IT: A growing, invisible threat to your IT operations

Imagine having large-scale, rogue IT operations right under your nose, moving massive amounts of data, entirely undetected and outside of your IT security parameters? Meet the new rogue IT — a growing trend that may have already found...

How to prepare your organization for the risk of data loss

How to prepare your organization for the risk of data loss

Have you implemented policies to ensure your business is risk-ready?

Counter cybersecurity threats with a human-machine dual strategy

Counter cybersecurity threats with a human-machine dual strategy

Earlier this year, the 3.5-hour outage at the New York Stock Exchange (NYSE) raised a lot of eyebrows in the IT community. While official statements claim "technical issues" following a software update, human error still played a...

Load More