When I first started looking after Unix systems, I spent most of my days in a remote shell. If you didn’t live in the data centre, that’s what you did, even before ssh replaced telnet. Since moving to Kubernetes, logging into a server may have become less common, but when things go really wrong, I … continue reading
Corero Network Security has disclosed that the Memcached vulnerability that was responsible for last week’s GitHub DDoS attack is more extensive than originally reported. It is now known that the vulnerability can be used to steal or modify data from the Memcached servers. Memcached is an open-source system that stores data in memory to speed … continue reading
Ransomware has cost US businesses over $75 billion. According to the FBI, there are over 4,000 attacks every single day. If your organization hasn’t experienced an attack, it will. In a recent webinar sponsored by Veriato RansomSafe, Nick Cavalancia, founder of Techvangelism laid out a five step plan to thwart ransomware attacks that businesses can … continue reading
Virtualization and cloud backup company NAKIVO has announced version 7.4 of NAKIVO Backup and Replication with a long list of features and improvements. According to the company, the biggest feature of the release is the automated VM disaster recovery for VMware, Hyper-V and Amazon Web Services. “The new version [of Backup and Replication] provides … continue reading
According to LogicMonitor’s “The Future of the Cloud – Cloud Influencers Survey,” by 2020, the share of workloads running in the public cloud could increase by 10 percent, from 31 to 41 percent. Despite this growth, some holdouts remain that prefer their self-managed on-site databases, citing concerns over the security of off-site managed database solutions, … continue reading
Check Point Software Technologies Ltd., a leading provider of cyber-security solutions globally, has today announced the CloudGuard product family to protect enterprises from Gen V cyber attacks on cloud applications and infrastructure. Check Point is also introducing CloudGuard SaaS protecting enterprises against cyber attacks on SaaS applications. CloudGuard is a part of the Check Point Infinity architecture, built … continue reading
Safe to say, mobile technology and explosive BYOD trends over the last decade have upended the traditional workplace environment and with it, traditional security protocols. Gone are the days in which employees’ data remains squarely on their workstations between the hours of 9 a.m. and 5 p.m. These days, organizations offer some kind of remote working policy. … continue reading
From the WannaCry ransomware attack that resonated across the globe, to the massive Equifax breach and series of security mistakes that followed, 2017 saw a major uptick in cyberattacks, with no signs of slowing down. While each incident was unique, they all highlighted the complexity of applying security at scale. Wrangling the vast number of … continue reading
Organizations are shifting to modern workplaces at a considerable rate, based on the latest telemetry gathered among thousands of enterprises over the past year. The data, gathered by identity and access management provider Okta Inc., showed a marked increase in the deployment of cloud infrastructure, management and application services. It also showed the increased move … continue reading
Tigera, a company delivering solutions for secure application connectivity for the cloud native world, today announced that they raised an additional $10M in funding to accelerate their mission to simplify and secure application connectivity across all cloud environments. The most recent round was led by Madrona Venture Group with participation from New Enterprise Associates (NEA) … continue reading
Check Point announced a new security consumption model designed to prevent Gen V cyberattacks at the cybersecurity summit CPX 360 in Barcelona this week. The Check Point Infinity Total Protection solution is designed to provide real-time protection against advanced mobile, cloud and enterprise network attacks. “Cyberattacks are getting bigger, more sophisticated and more complex daily, … continue reading
Asigra Inc., a leading cloud backup, recovery and restore software provider since 1986, today announced five information technology trends expected to impact data protection infrastructure and business outcomes in 2018. Like other technology segments, data protection has not been sheltered from the evolution of technology which is evolving as cloud computing, new regulatory requirements and a rise … continue reading