Encryption is an important part of our data security today. But how can data be protected at all times from the latest attempts to hack it? Tom Hollingsworth takes a look at how Fortanix is leveraging Intel GSX technology to create data fortresses to secure data even before it leaves the CPU.
For organizations that have begun to transition to the cloud, it has become apparent how straightforward it is to consume compute and storage services. Things that used to take days to provision are now accomplished in a number of clicks, or are transparently configured with no interaction required from the user at all. The fact that workloads are able to communicate with each other, or can be restricted from communicating, with equal ease is just as welcome.
With the COVID-19 pandemic in full effect, the race is on by medical researchers to find potential treatments and a vaccine. All this medical research requires a lot of computer power to model potential therapies quickly. Luckily, we’re seeing two different approaches each bringing a lot of power to bear.
Prepare for another attack on encryption in the U.S. The EARN-IT Act purports to be about protecting children from predation, but it’s really about forcing the tech companies to break their encryption schemes.
How does your infrastructure practice for an intrusion? Do you have a plan to drill your blue teams so they’re ready when at attack comes? Do you even know how you would start? Tom Hollingsworth takes a look at XM Cyber and their platform for helping your users prepare for the inevitable.
O’Reilly closes its event business, Microsoft has a font of exploits, the power of [email protected], and Storj Labs decentralizes cloud storage. Rich Stroffolino and Tom Hollingsworth discuss all this and more on the Gestalt IT Rundown this week, with special guest Stephen Foskett.
The challenge of data management is nothing new, and the Enterprise Storage market has responded at both ends of the spectrum by providing mature, high performance solutions for primary datasets, and lower-cost archival solutions for less important bulk data. But many businesses are discovering a capability gap when attempting to store secondary data that falls into the “everything else” category. For this reason, Cohesity has begun to leverage its core capabilities to attack new problems as customer requirements, and the definition of secondary storage, continue to evolve.
By now, we’re all familiar with software-defined wide area network or SD-WAN. SD-WAN enables the use of multiple circuit types, including both MPLS and commodity broadband. Everyone knows how reliable MPLS can be. Can broadband reach that level of assurance? Given the history of using the technology with enterprise networks, our panel of experts debates the premise that commodity broadband is inferior to MPLS.
FireEye recently published a study showing an 860% increase in “human-operated ransomware.” The study shows that this has resulted in attacks target times when organizations are least likely to respond. But what stood out were how they chose to visualize that information.
Adjusting to a new paradigm isn’t easy. And while many of us are hoping it’s temporary, some are hoping that “WFH” can be a more permanent situation. In this piece by Mike Talon, you’ll discover some tips to help you stay productive, positive, and professional, even if you’re working in pajama pants.