Data Centers

Data Center news, analysis, research, how-to, opinion, and video.

ransomware
analyze / inspect / examine / find / research / data / magnifying glass

Cisco Nexus 9615
video

Stress test: Cisco Nexus 9516 data center core switch

An inside look at the Cisco Nexus 9516 data center core switch.

mingis_on_tech_cisco
video

Mingis on Tech: The lowdown on Cisco Live

Network World's Brandon Butler checks in from Las Vegas, where this week's Cisco Live is under way. The big story: Cisco's efforts to move from hardware to software, security and "intent-based networking."

apc backup

22% off APC Back-UPS 600VA 7-outlet Uninterruptible Power Supply (UPS) with USB Charging Port - Deal Alert

The new APC BE600M1 Back-UPS has 7 total outlets: 5 battery backup outlets plus 2 Surge Protection outlets, more than ever before. BE600M1 Back-UPS is capable of powering your wireless networking equipment for 2 to 6 hours when power...

xen project hypervisor panda mascot

Xen hypervisor faces third highly critical VM escape bug in 10 months

The Xen Project has fixed three vulnerabilities in its widely used hypervisor that could allow operating systems running inside virtual machines to access the memory of the host systems, breaking the critical security layer between...

Met museum puts new technologies on display

Night at the information security museum

Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security...

cloud security

Finding and protecting the crown jewels

Layer 7 visibility and stateful application controls are important aspects of cloud security—protecting business-critical applications and data.

walking dead cloud zombies apocalypse

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

cloud security

The evolution of data center segmentation

Micro-segmentation, an evolution of network security, lets organizations add granular segmentation policies to their data center transformation strategy.

manometer measure pressure

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

video

How to add an external HDD to your Sony PS4

Sony's latest PS4 System Software now supports external hard drive support for the game console, letting you expand the storage from its original 500GB. Network World editor Keith Shaw shows you how to add the storage without needing...

apple data centers company tech news

Expert: Apple may have deployed unauthorized patch by mistake

Last month, reports came out that Apple accidentally installed a fake firmware patch on internal development servers. That's a lesson to all companies to be careful about where they get their patches.

3 IT guys in network room with motion blur

Thinking of cutting out your database administrator? Think again

While many companies today are turning to third-party solutions to manage their secure systems, the best (and safest) option is to hire a talented database administrator.

tight rope walking balance difficult challenge

Hunting for SOCs

New report looks at the trends, capabilities, and maturity levels of organizations’ security operations centers.

cryptolocker -ransomware - flickr

Fighting ransomware: A fresh look at Windows Server approaches

Make sure your backup files really work -- test them! -- or else they will be no use to you in this situation.

video

Up close with Amazon Snowball: Cloud migration for the data center

At the AWS re:Invent show, Network World's Brandon Butler takes a closer look at the AWS Snowball offering. The ruggedized appliance helps enterprises migrate very large amounts of data to Amazon's cloud.

data center

The risk of data theft -- here, there and everywhere

Today, the challenge of protecting sensitive data has increased exponentially, due to the fact that data has been leaking into the cloud, and individual PCs and mobile devices. This is how to address the challenges of this data...

email thinkstock

Make your emails more trusted with DKIM

There are authentication systems -- DomainKeys and its successor DKIM -- that try to mitigate some of the risk of trusting that emails are actually from who they say they are from.

twitter broken

BGP errors are to blame for Monday’s Twitter outage, not DDoS attacks

Early Monday morning, for about thirty minutes, Twitter went dark. Almost immediately, once service was returned, people started speculating about a massive attack. However, Monday’s outage wasn’t anything malicious, by all accounts...

Load More