Monday 12/16
The Urgent Need for Network Security
It’s clear that state-of-the-art firewall technology has reached new pinnacles of real-time threat intelligence and security, working to protect entire enterprises including data center, mobile, endpoint, cloud and IoT.
http://bit.ly/2LZHczD
Rubrik Intelligent Data Tiering Helps Customers Optimize Microsoft Azure Storage Consumption
The intelligence and logic that is built into Rubrik’s Instant Tiering and Smart Tiering technologies will help solve common problems and provide cost savings in the public cloud.
http://bit.ly/34mFdfn
Tuesday 12/17
New Year, New User Experience: NVIDIA vGPU Enhances Virtualization, Adds 8K VDI Display Support
NVIDIA vGPU software delivers an improved user experience and the performance of the latest GPUs needed to run the most demanding graphics, AI and high performance computing workloads in virtualized environments.
http://bit.ly/2EnWwSG
2019 Was the Year of Zero Trust
Years after the death of the data center, 2019 was a reckoning in the importance of identity and access management.
http://bit.ly/2YYBXpl
Wednesday 12/18
Citrix Workspace Live for Google Cloud
With the latest release of Citrix Workspace, Google Cloud customers can incorporate the G Suite tools their employees prefer to use into an intelligent work feed and deliver productivity-boosting, time-saving microapps that integrate multiple workflows by automating and simplifying common tasks within minutes.
http://bit.ly/34F8rGw
How Security Keeps Up When Developers Drive Open Source
CyberArk Conjur is an open source security service for controlling privileged access to critical systems. It works to secure secrets (i.e., passwords, SSH keys, certificates and API keys) used by non-human identities and users in CI/CD environments and across open source tools.
http://bit.ly/2S3oX03
Thursday 12/19
30 years of ransomware: How one bizarre attack laid the foundations for the malware taking over the world
Slowly but surely, the ransomware attacks were shifting their focus, with many of the professional criminal organisations turning away from attacking home users in favour of targeting businesses and public sector organisations, encrypting entire networks and making off with tens of thousands of dollars.
https://zd.net/2M9W5zJ
Edge computing requires a change in performance monitoring
As you move applications to the edge, evaluate your options for monitoring performance there as well. The cost of implementing edge-oriented network packet brokers may not be as much as you think. You also may be able to leverage existing switches to run network visibility and performance monitoring solutions.
http://bit.ly/2S5zUOR
Friday 12/20
F5 to Acquire Shape Security, Transforming Application Security
Shape protects the largest banks, airlines, retailers, and government agencies with sophisticated bot, fraud, and abuse defense. In particular, Shape defends against credential stuffing attacks, where cybercriminals use stolen passwords from third-party data breaches to take over other online accounts.
http://bit.ly/35HUI2F
8 Best Practices for Multi-Cloud Security
While a multi-cloud approach offers numerous benefits, there are some pitfalls to be aware of as well. This post will explore the pros and cons of multi-cloud usage, the unique security challenges it poses, and eight best practices to ensure your multi-cloud environment is properly secured.
http://bit.ly/34KnWNc