Data Centers

Data Center | News, how-tos, features, reviews, and videos

cloud security ts
fog visibility island

program dirty 2018.01.25 11.10.07.00 00 13 22.still003
video

Tech Talk: The coding benefits of serverless computing

The panel talks about serverless systems, which spin up a snippet of code that runs on demand to perform a business operation. It's a step toward a more developer-friendly approach to code development.

program dirty 2018.01.23 12.03.01.00 00 36 44.still001
video

Mingis on Tech: 2018 – the year blockchain breaks out

Blockchain continues to evolve and grow, as more companies test it out. It's now seen as the heart of a new global shipping platform that could save companies billions of dollars and as the underpinning for a P2P cloud storage...

network security hacker virus crime

The ‘gig economy’ comes to your data center security – on-demand, obviously!

The current status quo is broken. We can no longer be reactionary – we must be revolutionary.

hand holding paper cloud for amazon web services logo

AWS pushes into the trillion-dollar cybersecurity market

Amazon Web Services (AWS) enters the cybersecurity market with the debut of its Amazon GuardDuty service.

cybersecurity stock

Trend Micro positioned to take on enterprise security leaders

Trend Micro has the products, ecosystem and strategy to become an enterprise security leader. Now it needs to improve market visibility and get on CISOs’ radar.

intelbpstorage

When big data gets personal...and cloudy

What are the considerations for security and scalability when choosing cloud storage for identity platforms that service multiple millions, even billions of users?

ai and keeping human jobs primary

We need to stop dehumanizing security before it’s too late

Gary Golomb, co-founder of Awake Security, discusses the need to bring the human element back to the security operation center.

solar eclipse

When identity data eclipses digital identity

Digital identity needs to be redefined as verified identity data. Identity data, using the right tools, can be used to carry out online jobs on behalf of the real me. But the right technology, aka personal data stores, need to be in...

ransomware

How ransomware is creating a data backup explosion

As ransomware becomes more common, everyone will need to better understand the different types, how they work, and what their broader effects will be on the IT and IT security industries.

analyze / inspect / examine / find / research / data / magnifying glass

Identify risk in your hybrid cloud – and yes, there's plenty of it!

In the second part of this series, we examine the actual areas of risks in the hybrid cloud journey – and some of them may surprise you. This involves two elements: data and humans.

Cisco Nexus 9615
video

Stress test: Cisco Nexus 9516 data center core switch

An inside look at the Cisco Nexus 9516 data center core switch.

mingis_on_tech_cisco
video

Mingis on Tech: The lowdown on Cisco Live

Network World's Brandon Butler checks in from Las Vegas, where this week's Cisco Live is under way. The big story: Cisco's efforts to move from hardware to software, security and "intent-based networking."

xen project hypervisor panda mascot

Xen hypervisor faces third highly critical VM escape bug in 10 months

The Xen Project has fixed three vulnerabilities in its widely used hypervisor that could allow operating systems running inside virtual machines to access the memory of the host systems, breaking the critical security layer between...

Met museum puts new technologies on display

Night at the information security museum

Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security...

cloud security

Finding and protecting the crown jewels

Layer 7 visibility and stateful application controls are important aspects of cloud security—protecting business-critical applications and data.

walking dead cloud zombies apocalypse

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

cloud security

The evolution of data center segmentation

Micro-segmentation, an evolution of network security, lets organizations add granular segmentation policies to their data center transformation strategy.

manometer measure pressure

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

Load More