All recent articles

Enterprises Need To Prepare for Broader Cyberwar

Enterprises Need To Prepare for Broader Cyberwar

As the fighting in Ukraine escalates and it looks like Russia won’t have the quick and easy victory it anticipated, the war is already having…

Nine Best Practices for Zero Trust

Nine Best Practices for Zero Trust

With the escalation of hostilities in Ukraine, increased activity by cybercriminal groups, and an ever-expanding attack surface caused by enterprises migrating to the cloud and…

Why DevOps pipelines are under attack and how to fight back

Why DevOps pipelines are under attack and how to fight back

In mid-2017, Russian state-sponsored attackers installed a malicious worm in a Ukrainian financial software package. When businesses updated their software, it became infected. The worm,…

As Concerns About Ukraine Mount, Gov’ts Issue Ransomware Alert

As Concerns About Ukraine Mount, Gov’ts Issue Ransomware Alert

The first international joint advisory about ransomware was issued last week as concerns mount about a potential Russian invasion of Ukraine. Tensions rose even higher on…

By Looking at the Past, New Cyber Board Can Prepare Us for the Future

By Looking at the Past, New Cyber Board Can Prepare Us for the Future

The Department of Homeland Security launched the country’s first Cyber Safety Review Board this month, a private-public initiative designed to improve cybersecurity. The CSRB will start…

Latest Cisco VPN Router Vulnerabilities Pose Risks To Small Businesses – And Their Partners

Latest Cisco VPN Router Vulnerabilities Pose Risks To Small Businesses – And Their Partners

Last week, Cisco disclosed 15 vulnerabilities in Cisco routers, including five with “critical” severity ratings. The vulnerabilities, which affect the Cisco Small Business RV160, RV260, RV340, and…

Your AI strategy’s secret ingredient

Your AI strategy’s secret ingredient

AI is increasingly becoming a business imperative. Nine in 10 Fortune 1000 companies are not only investing in AI, but are increasing those investments, with…

Denial of Service Attacks Expected To Get Bigger, Nastier

Denial of Service Attacks Expected To Get Bigger, Nastier

A distributed denial of service (DDoS) attack can take down a company’s infrastructure, communications, applications, or other services. It costs money to recover from such…

Top Three Use Cases for AI in Cybersecurity

Top Three Use Cases for AI in Cybersecurity

Cybersecurity professionals are facing an unprecedented threat environment, with record-high numbers of attacks, shortage of qualified staff, and increasing aggression and sophistication from nation-state actors.…

Cato adds fine-grained CASB controls to SASE platform

Cato adds fine-grained CASB controls to SASE platform

SASE vendor Cato Networks is adding fine-grained cloud access security broker (CASB) controls to its platforms. When employees working from home or branch locations log…

Top 10 outages of 2021

Top 10 outages of 2021

The biggest outages of 2021 had one thing in common: they affected major infrastructure or services providers and, as a result, affected large numbers of…

Data residency laws pushing companies toward residency as a service

Data residency laws pushing companies toward residency as a service

Data residency laws require that companies operating in a country keep data about its citizens on servers located in that country. For companies that have…

How to know when AI is the right solution

How to know when AI is the right solution

AI adoption is on the rise. According to a recent McKinsey survey, 55% of companies use artificial intelligence in at least one function, and 27%…

Space is the final frontier for data centers

Space is the final frontier for data centers

Last year marked the first time humanity deployed a conventional data center in space. The HPE Spaceborne Computer-2 – a set of HPE Edgeline Converged…

Log4Shell Vulnerability Highlights Software Supply Chain Issues

Log4Shell Vulnerability Highlights Software Supply Chain Issues

Open source software has eaten the world, but last month’s Log4Shell vulnerability chaos highlights the potential dangers when enterprises don’t treat it with the respect it deserves.…

Top 5 elements needed for a successful data warehouse

Top 5 elements needed for a successful data warehouse

As companies strive for a unified view of their customers and other key corporate data, many turn to data warehouses as a place to keep…

6 AIOps hurdles to overcome

6 AIOps hurdles to overcome

IT operations teams have a lot to juggle. They manage servers, networks, cloud infrastructure, user experience, application performance, and cybersecurity, often working independently of one…

The benefits of embedded analytics

The benefits of embedded analytics

Traditional business intelligence platforms are designed to be used by expert users, data scientists or statisticians. These valuable employees wind up spending too much time…

Supply chain woes forcing more workloads to the cloud

Supply chain woes forcing more workloads to the cloud

Messaging services vendor Interop Technologies runs three data centers to provide services to customers and to run its own back-office systems. Interop also provides turnkey…

Looking Forward to 2022: What To Expect in Cybersecurity

Looking Forward to 2022: What To Expect in Cybersecurity

Winston Churchill said, “Generals are always prepared to fight the last war.” He said this like it was a mistake. But in cybersecurity, we must…

Enterprises See Exponential Growth in log4jshell Attacks

Enterprises See Exponential Growth in log4jshell Attacks

  The Apache Log4j library is a Java-based logging tool that is ubiquitous in enterprise applications. The vulnerability known as Log4Shell, first reported on Dec.…

7 top predictive analytics use cases: Enterprise examples

7 top predictive analytics use cases: Enterprise examples

Predictive modeling helps companies optimize their internal operations, improve customer satisfaction, manage budgets, identify new markets and anticipate the impact of external events, among other…

Trust no one: New technology platforms expand the attack surface

Trust no one: New technology platforms expand the attack surface

Next year, AT&T, Verizon and T-Mobile all plan to shut down their 3G networks, even as 5G rollouts continue around the country and around the…

Cisco CCIE certification explained

Cisco CCIE certification explained

Cisco Certified Internetwork Expert is Cisco’s most prestigious and most difficult certification to achieve, typically requiring years of industry experience and a deep understanding of…

On-prem-as-a-service comes into its own during pandemic

On-prem-as-a-service comes into its own during pandemic

Many companies accelerated their move to the cloud during the pandemic – including cloud-based computing, and, with SASE, cloud-based networking and security as well. But…

SolarWinds Hackers Step Up Attacks Against IT Services Firms

SolarWinds Hackers Step Up Attacks Against IT Services Firms

Late last year, we learned that Russian state actors compromised SolarWinds Orion, a widely used network monitoring tool, and were able to access the systems of…

Post-Pandemic, Data Centers Adapt to “New Normal”

Post-Pandemic, Data Centers Adapt to “New Normal”

For data center managers, the pandemic has changed everything. And we are not going back, at least, not anytime soon. And when we can go…

Cloud Identity Is “New Normal” Replacement for On-Prem Tools

Cloud Identity Is “New Normal” Replacement for On-Prem Tools

Today’s data center has very little in common with that of a few years ago. The old model of on-prem servers surrounded by a tough,…

API Attacks, Breaches Piling Up

API Attacks, Breaches Piling Up

In August, dozens of organizations using Microsoft Power Apps inadvertently exposed 38 million records — COVID-19 contact tracing, job applicants’ Social Security numbers, and even…

Data warehouses and holistic business intelligence

Data warehouses and holistic business intelligence

Business intelligence is the process of analyzing company data to better understand that data, spot anomalies or trends and make predictions. It’s possible to do…