Trust no one: New technology platforms expand the attack surface
The rapid deployment of 5G and edge computing, the transition to work-from-home, combined with accelerating growth of mobile apps, APIs and web services are expanding…
Cisco CCIE certification explained
Cisco Certified Internetwork Expert demonstrates an advanced understanding of networking principles plus specialized expertise in an area such as enterprise infrastructure, wireless, data center, security,…
On-prem-as-a-service comes into its own during pandemic
With this approach, the hardware is owned by the service provider, so upfront capital expenses are replaced by operating expenses. Scaling up and down is…
SolarWinds Hackers Step Up Attacks Against IT Services Firms
The Russian state actors behind last year’s SolarWinds attack have been targeting IT resellers and service providers since at least May, according to a Microsoft…
Post-Pandemic, Data Centers Adapt to “New Normal”
Data center management has permanently changed as a result of the coronavirus pandemic. Read up on how data centers are evolving.
Cloud Identity Is “New Normal” Replacement for On-Prem Tools
With the rise of work-from-home, SaaS, IoT, cloud, mobile and edge computing, the traditional on-premises identity and authentication systems are becoming obsolete, giving way to…
API Attacks, Breaches Piling Up
APIs have emerged as a major attack vector, with only 6% of companies reporting no API-related security issues in the past year, according to one…
Data warehouses and holistic business intelligence
Data warehouses help companies gather analytics on individual systems and data for a holistic view of company performance, spot correlations and make informed decisions.
Making the most of sentiment analysis
Thanks to machine learning, companies can now begin to put the ability to determine the emotional value of communication to work. Here’s how organizations can…
Five Functions That Benefit From Cybersecurity Automation
Businesses are facing staff shortages and budget constraints that impact their ability to maintain security. Cybersecurity automation, including AI-powered intelligent automation, is helping close the…
What is a chatbot? Simulating human conversation for service
Coupled with artificial intelligence, chatbots are seeing massive growth in use in an expanding array of domains, from customer service to employee interfaces.
SASE Model Proving Value Beyond Remote Work Scenarios
When the pandemic hit, enterprises rushed to the new cloud-based networking solutions for remote employees. Now it’s being applied to on-prem data centers and WANs.
Paying Hackers’ Ransom Demands Is Getting Harder
The U.S. Treasury Department has sanctioned a cryptocurrency exchange for its role in facilitating ransomware payments and issued an advisory to private companies against making…
OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure
New Azure-based OMIGOD vulnerability is easy to exploit and has already been attacked by Mirai botnet.
What to expect from SASE certifications
NETWORK WORLD–Free and fee-based SASE certifications are cropping up from vendors including Cato Networks, Netskope and Versa Networks. Are they worth the effort?
Cisco adds specializations to its CCNP cert
NETWORK WORLD–Cisco Certified Network Professional demonstrates understanding of core networking principles plus specialized expertise in an area such as data center, security,and network programmability.
What is sentiment analysis? Using NLP and ML to extract meaning
Sentiment analysis, which enables companies to determine the emotional value of communications, is now going beyond text analysis to include audio and video.
Zero-Trust Model Gains Luster Following Azure Security Flaw
DATA CENTER KNOWLEDGE–Microsoft Azure vulnerability, ChaosDB, exposes the fact that enterprises can’t simply trust cloud providers to protect the infrastructure. Experts point to the zero-trust…
What is AIOps? Injecting intelligence into IT operations
Organizations seeking to better monitor IT assets are turning to artificial intelligence to get ahead of performance issues and to automate fixes before negative impacts…
Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’
Researchers from cloud security firm Wiz reported an Azure vulnerability affecting Cosmos DB that gave them complete access to thousands of Azure customers.
Taking a Close Look at the $2B for Cybersecurity in the $1T US Infrastructure Bill
The $1 trillion spending package includes funds for bolstering cybersecurity posture in critical digital infrastructure.
What is information architecture? Structuring content for maximum value
CIO–Information architecture ensures content and data is structured, organized, and categorized in an effective and usable way, thereby maximizing the value of your websites and…
What is a managed service provider? Strategic outsourcing for IT services explained
CIO–MSPs are increasingly being turned to as strategic outsourcing partners that remotely manage or delivery IT services, thanks to talent and technologies most enterprises lack.
Ransomware recovery: 8 steps to successfully restore from backup
The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.
Network certs 2021: Significant raises for the right ones
NETWORK WORLD–As employees split their time between the office and working at home, IT skills requirements have shifted to cloud, security, and automation.
How Salesforce finds and upskills AI talent
CIO–The talent gap is the No. 1 impediment to AI success. Salesforce.com’s multipronged approach can provide IT leaders with a playbook for finding and upskilling…
Why CISA’s China Cyberattack Playbook Is Worthy of Your Attention
The advisory outlines the tactics, techniques, and procedures China’s state-sponsored cybercriminals use to breach networks.
Cisco CCNA certification explained
Cisco Certified Network Associate is an associate-level certification designed to demonstrate that a candidate understands the fundamentals of networking, including network access, IP connectivity, security…
The Kaseya Ransomware Attack Is a Wakeup Call for MSP-Reliant IT Shops
DATA CENTER KNOWLEDGE–The pandemic has driven more outsourcing to MSPs, making them prime targets for cybercriminals wanting to scale their attacks.
Security Problems Worsen as Enterprises Build Hybrid and Multicloud Systems
DATA CENTER KNOWLEDGE–Under pressure to accelerate cloud adoption, IT orgs often skip over crucial security planning steps.