Topic: security

Race to secure: Why hardware wins

Safe to say, mobile technology and explosive BYOD trends over the last decade have upended the traditional workplace environment and with it, traditional security protocols. Gone are the days in which employees’ data remains squarely on their workstations between the hours of 9 a.m. and 5 p.m. These days, organizations offer some kind of remote working policy. … continue reading

DevSecOps predictions for 2018

From the WannaCry ransomware attack that resonated across the globe, to the massive Equifax breach and series of security mistakes that followed, 2017 saw a major uptick in cyberattacks, with no signs of slowing down. While each incident was unique, they all highlighted the complexity of applying security at scale. Wrangling the vast number of … continue reading

Authentication telemetry shows shifts toward modern IT

Organizations are shifting to modern workplaces at a considerable rate, based on the latest telemetry gathered among thousands of enterprises over the past year. The data, gathered by identity and access management provider Okta Inc., showed a marked increase in the deployment of cloud infrastructure, management and application services. It also showed the increased move … continue reading

Tigera raises $10M from Madrona, NEA and Wing

Tigera, a company delivering solutions for secure application connectivity for the cloud native world, today announced that they raised an additional $10M in funding to accelerate their mission to simplify and secure application connectivity across all cloud environments. The most recent round was led by Madrona Venture Group with participation from New Enterprise Associates (NEA) … continue reading

Check Point prepares for next-gen cybersecurity attacks with Infinity Total Protection

Check Point announced a new security consumption model designed to prevent Gen V cyberattacks at the cybersecurity summit CPX 360 in Barcelona this week. The Check Point Infinity Total Protection solution is designed to provide real-time protection against advanced mobile, cloud and enterprise network attacks. “Cyberattacks are getting bigger, more sophisticated and more complex daily, … continue reading

Five information technology trends to shape data protection in 2018

Asigra Inc., a leading cloud backup, recovery and restore software provider since 1986, today announced five information technology trends expected to impact data protection infrastructure and business outcomes in 2018. Like other technology segments, data protection has not been sheltered from the evolution of technology which is evolving as cloud computing, new regulatory requirements and a rise … continue reading

How Spectre and Meltdown hardware flaws alter IT Ops playbook

On New Year’s Eve, most IT Ops pros had never heard of Spectre and Meltdown. Within two days, the latest vulnerabilities became a key IT management priority for 2018. Now IT Ops pros are coming to terms with the range of systems they may need to patch and the potential impact the fixes might have … continue reading

ZeroStack Enhances IT Visibility in Self-Driving Cloud Platform

ZeroStack, Inc., creators of a self-driving on-premises cloud, today unveiled new host-based metrics that enable better, more proactive IT management of its cloud platform. Cloud administrators can now define and enable alerting policies based on the status of physical hosts. Alerting policies can be defined on specific host-based CPU utilization, storage, network bandwidth, and other … continue reading

What organizations need to know about IT security risk management

Organizations have a rather funny and paradoxical relationship with IT security. Basically, nobody really wants to dedicate resources to their security needs until something bad happens. I think a big part of the challenge is that the notion of IT security can leave business decision makers feeling a little overwhelmed, especially when faced with the … continue reading

IT transformation can be a monster

Frankenstein is a monster. IT can harm the people who created it. Ergo, IT is a monster. Taking a software tool from this vendor, hardware from another vendor, using a cloud-based storage and network system, can often lead to problems not foreseen by those who approved that approach. “There’s a new philosophy of how IT … continue reading

Microsoft to acquire file storage provider Avere Systems

Microsoft has agreed to acquire file storage provider, Avere Systems. Avere Systems offers NFS and SMB file-based storage for Linux and Windows clients, whether they are running in cloud, hybrid, or on-premise environments. According to the company, Avere provides low-latency data access to data center storage resources. It allows customers to share computer and storage resources … continue reading

What dev should know about IT Ops

Operations is going through a fundamental shift as infrastructure itself shifts from hardware to software.  The “software-defined” future has arrived and it’s something enterprises must embrace if they want to deliver Internet-scale applications and pivot as quickly as today’s business environment requires.   Software-defined architecture uses a virtualization layer to optimize the use of resources. … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!