Sign up | Login with →

IT

IBM Opens Up Its Threat Data as Part of New Security Intelligence Sharing Platform

April 18, 2015 by Sarah Smith

IBM.

IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other network defenders. On Thursday, the company opened up over 700 terabytes of data about vulnerabilities, attacks and other threats through a new cloud-based threat intelligence sharing platform called IBM X-Force Exchange. Other organizations can use the platform to share or confirm their own data, so they can more efficiently respond to security incidents.[read more]

exclusive

Malicious Tool Provides Attackers with a New Type of Zombies

April 15, 2015 by Sophie Davidson

Cyber criminals.

An interesting concept which has really emerged only lately - IoT, or: “the Internet of Things”, has recently been in the scope of cyber criminals and internet security specialists. The IoT is a vision, rather than an actual network. It's the notion that with increasingly more devices empowered by communication facilities, those devices inevitably end up as entities in a network scheme.[read more]

exclusive

Media & Entertainment Industry Casting Call: High Resolution Digital Assets Offer New Role for Petabyte Storage

April 14, 2015 by Russ Kennedy

Petabyte.

Data size is quickly outpacing storage space in the media and entertainment industry, and object-based storage can play a pivotal supporting role to help companies meet growing challenges[read more]

exclusive

How to Clean Up the Mess: Surviving a Data Breach

April 14, 2015 by Neill Feather

Data breach.

Here’s a scary thought: Nearly half (43%) of all companies experienced a data breach last year, most of which took weeks to discover. For many businesses, these data breaches were catastrophic to the point of bankruptcy (the average cost of a single compromised record being more than $194).[read more]

How to Bolster the Skills of Your In-house IT Team

April 13, 2015 by Simon Mitchell

IT team.

Over-staffing an IT department is as undesirable as under-staffing – the solution is to right-size to cover normal operations but also use a good Managed Service Provider. The IT world is changing. Organisations are increasingly threatened with hacking and viruses such as Heartbleed. A wider-than-ever skillset is needed. Can your internal IT team cover all bases?[read more]

Facebook’s ThreatExchange to Help Cyber Security Experts Coordinate Their Efforts Against Hackers

April 9, 2015 by Sarah Smith

Cyber security.

These days, cyber attacks are the biggest threat to companies and governments around the world. Even President Obama recently laid out a comprehensive plan to tackle cyber security issues. It remains to be seen what results Facebook's ThreatExchange can produce. Still, any platform that brings cyber security experts together and encourages them to share data is a positive development. Hackers are only going to step up their efforts, and security experts need to respond with a concerted effort.[read more]

exclusive

Obstacles Still Getting in the Way of the Progress of the Internet of Things

April 4, 2015 by Rick Delgado

Internet of things.

Technological advancements seem to happen with astonishing regularity these days, and perhaps no development is more exciting and filled with more potential than the Internet of Things (IoT). The IoT could possibly changes our lives, keeping everybody more in touch with others and the objects around us. Businesses could be run more efficiently.[read more]

exclusive

Data Lakes and Network Optimization: What’s Next for Telecommunications and Big Data

March 31, 2015 by Sameer Nori

Telecommunication. 

Relational data warehouses served communications service providers well in the past, but it’s time to start thinking beyond columns and rows. Unstructured data will be the fuel that powers risk management and decision-making in the near future. And to use all sorts of data to its fullest potential, we need new ways of storing, accessing and analyzing that data.[read more]

exclusive

A Look at How Keyless SSL Works

March 28, 2015 by Anand Srinivasan

Secure socket layer.

Secure Socket Layer, or SSL for short, is one of the key elements to providing a safe and secure web transaction. Websites that offer financial services or handle confidential user information have for long used SSL technology to encrypt such sensitive data and thus deter hackers from stealing them.[read more]

exclusive

Winning Strategies for Enterprise Mobile App Development

March 24, 2015 by Glenn Johnson

Mobile apps.

Enterprise mobile apps are being commissioned at a hectic pace across all industries, geographies and business processes. Employees see mobile apps as an essential means of resolving issues raised in phone calls, emails and other messages delivered by smartphones and tablets usually while the employee is ‘off site’ and ‘off duty.’[read more]

exclusive

XaaS: Today and Tomorrow

March 22, 2015 by Beata Green

Everything as a service.

You may have heard the terms SaaS (software as a service), infrastructure as a service (IaaS) or PaaS (platform as a service). However, what about XaaS? This acronym stands for “anything as a service.” Simply put, XaaS stands for software, infrastructure and platform as a service when they are all delivered in a single package. When put together, these three services replace those that traditionally were provided by one or more IT departments or companies.[read more]

exclusive

5 Non-Standard Ways to Use Cloud Storage

March 21, 2015 by Terry Smith

Cloud storage.

We all get used that cloud storages like Dropbox and Google Drive serve one definite purpose: to keep our data online. Thus, we can easily add, remove, share access, open, or edit files and rest assured that the storage would backup and synchronize all our changes. This is a standard way to utilize a service like this. However, more advanced users are constantly finding new ways to benefit from certain cloud storage options. Have a look at five most non-standard tricks you can do with your Dropbox or Google Drive.[read more]

exclusive

Are You Prepared for Multi-Cloud Challenges?

March 20, 2015 by Jared Jaureguy

Cloud computing.

There’s little question that cloud computing can provide you with innovative and helpful new applications designed to increase your company’s capabilities and productivity. Many businesses end up using multiple services to reach the potential that the cloud promises.[read more]

exclusive

What Is Network-as-a-Service (NaaS) And Should You Care?

March 9, 2015 by Anand Srinivasan

With significant developments in the area of network functions virtualization (NFV), software defined networking (SDN) and OpenFlow, it is important to see these various products as part of the greater need to design and deploy network services with agility and scale – something that NaaS offers.[read more]

Protecting Your Data Wherever It Goes [INFOGRAPHIC]

March 5, 2015 by Zach Taiji

Your data.

In today’s world, the top four places your data is at risk is the cloud, email, third parties and mobile devices according to a new study by information security company Seclore.[read more]