The word is spreading on the Internet that respected secure email provider ProtonMail has been hacked by an anonymous group. A pastebin post claims that the company intentionally undermined its own security features, allowing the hacker group to infiltrate the front-end code and steal the passwords and data. They also make some wild claims about ProtonMail’s own activities and those of their users.
SD-WAN is a simple solution for a complex problem. But are network engineers contributing to the complexity? Ethan Banks takes a look at the issue of complexity in SD-WAN and how we can eliminate some of it by making smart decisions.
Chaos Engineering as a concept and as a practice has been growing in popularity over the last few years. It was first popularized by Netflix in 2011 and continues to evolve as adoption continues to grow. What was once an operation model only possible for hyperscalers has come within the reach of most organizations.
AWS re:Invent is right around the corner and I will be attending my first event as a member of the Gestalt IT team. Believe it or not, this will also be my first trip to re:Invent, so I reached out to my friends in the community for their advice on how to tackle this monstrosity of a conference.
I’ve long been skeptical of an ARM transition for Apple Macintosh, but the 2018 iPad Pro has made me a believer. Apple will switch to in-house hardware and this new generation of “ARMacintosh” computers will blow away the rest of the client computing market. And the only way a company could challenge Apple’s escalating dominance in mobile and tablets would be a radical new device.
The Gestalt IT Rundown is your source for the latest IT news. This week, Ken Nalbone and Rich Stroffolino discuss the latest VMware acquisition, Amazon’s HQ2 getting a biblical twist, and as always, new chip news.
Recently, Dremio released version 3.0 of their Data-as-a-Service platform. Since the release of Dremio over one year ago, the company has made several enhancements to the platform aimed at addressing many of the requirements for broader adoption of the platform by the enterprise.
Solving the riddle of wireless multicast isn’t always cut-and-dried. Guest blogger Hank Yeomans takes a look at the challenge he need to solve for his company and details his solution in this post.
In 2017, iPad Pros suddenly started appearing around the table at Tech Field Day events, supplanting the usual sea of laptops. With the release of new iPad Pro in 2018, will that trend continue, or will the versatility tradeoff eventually become too much for delegates?
Tom Hollingsworth and Jack Daniel discussed the biggest challenge in becoming a part of the security community today: agreeing to disagree. One of the negative aspects of social media and hyper connectivity is the new frame of mind that people have a position and will fight and shout for it without compromise. While that does have a time and place, it is not contributing to a healthy debate in the security community or other technology communities either.