Veristor Systems, Inc. and Armis announced a partnership to provide cybersecurity asset management, risk management and automated enforcement to address the new threat landscape of IT, OT, IoT, medical and unmanaged devices. “The rising threat of cyberattacks in non-corporate IT environments combined with a rapid influx of non-traditional connected devices in today’s enterprise environments creates […]
Archives for March 2021
What are NFTs and are they just another digital fad?
While you may not have heard the term ‘non-fungible tokens’ (NFTs) before, this digital concept has exploded in the art, music and gaming sectors of late. To this end, a number of high-profile NFTs have been sold globally during Q1 2021, with one fascinating project seeing a digital token representing a burnt piece of Banksy […]
How to build a honeypot to increase network security
A honeypot is a network device that tricks hackers into thinking they’ve broken into an organization’s real network when actually they are in a fake network set up as a trap. Once lured into a honeypot, an attacker’s activities can be monitored and analyzed. Honeypots are designed to attract hackers, and the more convincing they […]
Distractions and the downsides to working from home
Remote workers cite a decrease in life satisfaction, more reliance on mobile devices, longer hours than at the office and fewer perks, according to a new survey by Joblist. Image: iStock/stefanamer For many, remote work wasn’t a choice but thrust upon them due to the rapid evacuation of on-premises offices because of the COVID-19 pandemic. […]
Defining IAM Policies with Terraform safely
Are you still defining IAM policies using heredoc syntax (<<EOF … EOF) or jsonencode()? You can do better! As a result, terraform validate can tell you about typos before you apply them, and you get better auto-complete support from your IDE. Read on to learn how to define IAM policies in Terraform safely. When looking […]
How IoT Aids in Monetizing Your Data through Predictive Analytics
March 30, 2021 Tanya Surfian, Sr. Manager of Marketing & Business Development, JIG-SAW US Business Advantage One of the remarkable parts of our emerging world is we are finding more creative and innovative ways to be efficient. From electric cars and automation to things like VR and space travel, we have been able to transform […]
StarWind VSAN for VMware vSphere new version released
StarWind has released a new version of their flagship software – StarWind VSAN for VMware vSphere. This new release (build 14066) has a new Linux kernel, brings some performance optimizations, and also irons some bug fixes along the way. So if you’re a VMware user, it’s time to update. There are also some updates in […]
Deploy key design principles with enterprise-scale architecture
This post was co-authored by Sarah Lean, Senior Content Engineer, Azure Tailwind Traders1 is a retail company that is looking to adopt Azure as part of its IT strategy. The IT team is familiar with deploying infrastructure on premises and is now researching what they need to do in order to run their workloads within […]
NHS is apparently closing security skills gap
The NHS is doing great work closing its security skills gap, with the average trust now employing twice as many in-house security practitioners – defined in this instance as someone with a professional IT security qualification – than it did two years ago, 2.8 in 2020 compared with 1.9 in 2018, and the number of […]
Security Think Tank: Evolving threats, tech, leaves CNI exposed
The industrial control systems (ICS) that underpin our critical national infrastructure (CNI) are facing ever-increasing risk, and the immediate risks to ICS and other operational technology can be seen in the growing incidence of ransomware, changing connectivity and increased attention. Ransomware can have a devastating effect on a business or organisation, as the UK NHS […]
- 1
- 2
- 3
- …
- 25
- Next Page »