The rise of cheap but capable ARM processors, and the saturation of internet connectivity with Wi-Fi and cellular, has led to the rapid spread of Internet of Things devices. IoT can now be found across the consumer and enterprise landscape, finding itself particularly well suited for industrial, campus, and municipal applications. But has security risen to meet the sudden influx of IoT devices? Not quite. Rich Stroffolino breaks down the problem, why enterprises will eventually catch up, and what the regulatory landscape might look like when they do.
Is your monitoring dashboard full of infuriating red lights? Maybe it’s all green without the details to assure you everything is secured? How would you know if what you saw was accurate? Tom Hollingsworth takes a look at Brinqa and how their cybersecurity risk graph gives you all the information you need without making you stop to look at what you are missing.
Welcome to Tomversations! This episode dives into a new hot topic – the announcement of 6 GHz and the differences between Wi-Fi 6 and Wi-Fi 6E and why it might affect you as you look at your next access point purchase.
Nvidia made waves early last year when it announced it was buying Mellanox. A scant 13 months later, and the acquisition has finally closed. Over the last decade, Nvidia has fundamentally redefined itself as a company, moving from a consumer graphics card maker to becoming an enterprise stalwart in AI and ML. So given that trajectory, where does the acquisition of Mellanox fit? Rich Stroffolino breaks it all down in this first episode of Checksum!
How do you ensure that IoT devices are secure? How can you even be sure that nothing has been done to them when they’re outside of your control? How do you keep track of all the bugs and updates and patches? Tom Hollingsworth takes a look at Jitsuin and their Archivist platform and how it can help you solve your IoT issues with exciting new technology.
If you secure something, how do you know it’s safe? Likewise, how can you ensure the things you’re monitoring are truly safe? You need a tool that works on both sides of the house to keep tabs on everything and keep it all safe. Tom Hollingsworth takes a look at how Sysdig has created a platform to help you secure your DevOps and container environments while also keeping them visible.
What evil lurks inside your peripherals? Would you even know what to look for? Tom Hollingsworth talked to Sepio Systems at RSA Conference this year to learn all about how they’re hunting for malicious hardware hiding in your organization.
This Gestalt IT Showcase, The Zen of Storage, is presented by Stephen Foskett @SFoskett. The Gestalt IT Showcase is an interactive conversation featuring a company subject matter expert and a panel of independent, technical IT influencers. IT Influencers dig in, ask questions, and discuss the content on camera – creating a conversation you won’t see anywhere else.
Welcome to Tomversations! This episode covers SD-WAN and the newest aspect to the technology – Secure Access Service Edge (SASE).
Enrico Signoretti participated in a Gestalt IT Showcase presented by Keith Townsend, @CTOAdvisor. This post examines his ideas around the subject of data gravity.