Do you have full confidence in your security monitoring solution? It would appear that no one does based on a recent report. But ExtraHop is hoping to change that with a new product called Reveal(x) that combines their award-winning network monitoring solutions with a security focus to help you decipher what your infrastructure may be hiding.
Where do you start when a tech topic gets too deep? First Five! Our new series takes a step back and introduces a new tech topic with five things you want to know. It’s your quick and easy fix to understand the technological fundamentals all around us. For our debut, First Five breaks down the Cloud.
I had the privilege to talk to Jack Daniel about how he gradually made the transition from auto mechanic to IT, and then later entered the security community. We had a great conversation, ranging from the danger of absolutism in IT, the structure of various security communities, to what’s a cool drink to get at a bar.
The EU GDPR data privacy regulation is set to go live later this year. What is GDPR? What makes it so special for the protection of personal data? What do you need to know to get compliant before it’s too late? Tom Hollingsworth walks you through the pieces to help make sense of this landmark regulation.
Data breaches were one of the dominant IT trends in 2017. In here recent ebook, Karen Lopez delves into why it’s often not from a lack of technical security, but failures of communication that can lead to these leaks.
In this iteration of Gestalt Server News:
– The On-Premise IT Roundtable discusses if security is a dumpster fire
– The Gestalt IT Rundown looks at the week that was in enterprise IT
– and we talk to Phil Gervasi about how he got started in IT
Plus a preview of Commvault GO 2017!
Security is a dumpster fire, or is it somehow worse? Our esteemed guests discuss whether it’s actually many dumpster fires or some other form of refuse conflagration. It’s an invaluable and inflammable discussion.
In this episode, the roundtable discusses the idea of technical debt. They look into why technical debt occurs, why it isn’t always a bad thing, and how to possibly optimize for when to incur it.
The Cyber Security Research Center at Ben-Gurion University may not be an every day name in security. But every few years, the come up in the news for finding another theoretical way to defeat air gapped security. They’ve found ways to exfiltrate data by using the sound of a computer fan, and the whirring buzz of a mechanical hard drive. These all require some pretty serious infiltration on the machine already, but conceptually they’re all fascinating.
This time, the researchers targeted a router for their Mission Impossible-style hack.
Richard Arnold put together a concise piece to address a lot of questions and concerns coming out of the WannaCrypt crisis. He outlines a little history and context for what exactly is ransomware. He then takes a storage centric approach to outlining basic IT policies that would help mitigate future disruptions.
The piece is a great summation. It doesn’t have the audacity to say the attack was preventable, but rather that best practices could serve to limit future disruptions. It’s an interesting read to wrap your head around a global issue.