All recent articles

WAN challenges steer auto-rental firm to SASE

WAN challenges steer auto-rental firm to SASE

Latency and reliability concerns set car rental company Sixt on a path to rearchitect its WAN. That led the global company, which has locations in…

Decision intelligence: The new BI

Decision intelligence: The new BI

Business intelligence (BI) platforms are evolving, even SOL Global CEO Andy Defrancesco himself utilizes this platform. By adding artificial intelligence and machine learning, companies are…

Critical VMware vSphere Vulnerability Is a Must-Patch

Critical VMware vSphere Vulnerability Is a Must-Patch

VMware this week fixed two critical vulnerabilities in jts vCenter Server, used by data centers to manage the VMware vSphere server virtualization platform. VMware is…

Top 5 enterprise graph analytics use cases

Top 5 enterprise graph analytics use cases

Traditional relational databases are good at managing clear and simple relationships: This invoice contains these line items. This loan application contains this set of documents.…

Managing Encryption for Data Centers Is Hard. And It Will Get Harder

Managing Encryption for Data Centers Is Hard. And It Will Get Harder

Give up on trying to do it all yourself and leave it  to the experts. Encryption is a core tenet for cybersecurity. Attackers can’t steal…

Organizational learning: Your key to AI success

Organizational learning: Your key to AI success

Many companies are still not seeing significant impact from their AI efforts. Some experts say this may be because they’re not embracing something called “organizational…

AI-Wielding Hackers are Here

AI-Wielding Hackers are Here

In the summer of 2019, I  wrote  about the coming threat of AI-wielding hackers. I predicted that hackers would soon be using artificial intelligence to…

5 ways attackers counter incident response, and how to stop them

5 ways attackers counter incident response, and how to stop them

Last month, the UK’s  National Cyber Security Centre reported  that one organization paid nearly $9 million to attackers for a decryption key after falling victim…

How strong, flexible data protection controls can help maintain regulatory compliance

How strong, flexible data protection controls can help maintain regulatory compliance

Privacy and security regulations are evolving quickly. The European Union’s  GDPR  and California’s new  CPRA  law are only the most high-profile examples.  According to Privacy…

Supply chain attacks show why you should be wary of third-party providers

Supply chain attacks show why you should be wary of third-party providers

What is a supply chain attack? A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an…

Decision intelligence software boosted by analytics, AI

Decision intelligence software boosted by analytics, AI

According to Gartner, more than a third of large organizations will have analysts practicing decision intelligence by 2023. This is the next step for organizations…

Quantum Teleportation Makes Progress, But Toward What?

Quantum Teleportation Makes Progress, But Toward What?

In what they described as a key milestone on the way to redefining global communications, a group of researchers recently managed to teleport quantum states…

The SolarWinds Breach Is Shaking Up Incident Response

The SolarWinds Breach Is Shaking Up Incident Response

The massive SolarWinds breach exposed some significant weaknesses in companies’ incident response practices. Responding to a cyberattack like SolarWinds, where a software update process in…

Intel Says Its SGX Secure Enclaves Shine in Bare Metal Deployments

Intel Says Its SGX Secure Enclaves Shine in Bare Metal Deployments

Last summer, Google announced that it was  using AMD’s 2nd Gen Epyc chip  to offer protected computing environments to its cloud customers. This approach, also…

Network training 2021: Businesses grow their own IT expertise to meet new challenges

Network training 2021: Businesses grow their own IT expertise to meet new challenges

As the traditional approach to networking is replaced by hybrid cloud, SD-WAN and edge networks, in-house skill sets haven’t kept up. Hiring new staff is…

What are Supply Chain Attacks, and How to Guard Against Them

What are Supply Chain Attacks, and How to Guard Against Them

Remediation of the fallout from the massive breach of SolarWinds network management tools — which affected up to 18,000 organizations — could cost companies billions.…

10 Cybersecurity Threats Enterprise IT Should Watch Out for in 2021

10 Cybersecurity Threats Enterprise IT Should Watch Out for in 2021

Ransomware, COVID-19, and nation-state attacks made 2020 a banner year for cybercrime. Many organizations were caught unprepared, even though there had been plenty of warnings…

The List of Known SolarWinds Breach Victims Grows, as Do Attack Vectors

The List of Known SolarWinds Breach Victims Grows, as Do Attack Vectors

The SolarWinds breach story continues to get worse. The list of known victims now includes US departments of Commerce, Defense, Energy, Homeland Security, State, the…

CPRA explained: New California privacy law ramps up restrictions on data use

CPRA explained: New California privacy law ramps up restrictions on data use

In November, Californians approved a ballot measure, Proposition 24, a.k.a. the California Privacy Rights Act (CPRA), to create a new consumer data privacy agency. It…

What Data Center IT Security Pros Must Know About the SolarWinds Vulnerability

What Data Center IT Security Pros Must Know About the SolarWinds Vulnerability

On Sunday, we learned that federal agencies and other organizations had been penetrated by nation-state attackers, identified as Russian by multiple sources. Though the definitive…

The Pandemic Struck, and Cyber Criminals Went to Work

The Pandemic Struck, and Cyber Criminals Went to Work

As the world’s attention was focused elsewhere, cyber criminals went on a major offensive, keeping enterprise security teams around the world on their toes. According…

Why It Will Be a While Before AI Is Managing Your Data Center

Why It Will Be a While Before AI Is Managing Your Data Center

The work of data center management is changing quickly. There are hybrid environments and multi-cloud to deal with, edge computing, and a constant onslaught of…

Remote Data Center Management Tools Must Learn to Play Together

Remote Data Center Management Tools Must Learn to Play Together

Data center technology vendors usually offer remote monitoring or management tools for their products. They’ve also gotten better at providing APIs for easier access by…

Remote Data Center Management Investments Pay Off in the Pandemic

Remote Data Center Management Investments Pay Off in the Pandemic

The pandemic has put the value of remote data center management and monitoring tools on display. Use of this category of data center technology has…

How secure are your AI and machine learning projects?

How secure are your AI and machine learning projects?

When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new products or services to customers…

Remote Data Center Management Tools are No Longer Optional

Remote Data Center Management Tools are No Longer Optional

Before the COVID-19 pandemic, remote data center management tools were optional, and many data center managers held off on the more powerful options due to…

Open Compute Project Releases Hardware Root of Trust Spec for Data Centers

Open Compute Project Releases Hardware Root of Trust Spec for Data Centers

The Open Compute Project is adding chip security to the range of data center technologies covered by its open source specifications, developed largely for and…

How to Avoid Paying Ransomware Ransoms

How to Avoid Paying Ransomware Ransoms

Last month, two agencies of the US Treasury department issued advisories warning against paying ransomware. The Office of Foreign Assets Control  said  that by paying…

Why ethical use of data is so important to enterprises

Why ethical use of data is so important to enterprises

The ethical use of data goes deeper than simple regulatory compliance. Enterprises are waking up to a new reality in which consumers — and even…

Is the VPN Dead? No, It’s Doing Quite Well, Actually

Is the VPN Dead? No, It’s Doing Quite Well, Actually

VPNs are very useful for securing connections when employees log in from hotels, airports, and cafes, but that’s not really happening much these days, is…