This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On December 20, 2019

Monday 12/16

The Urgent Need for Network Security

It’s clear that state-of-the-art firewall technology has reached new pinnacles of real-time threat intelligence and security, working to protect entire enterprises including data center, mobile, endpoint, cloud and IoT.

Rubrik Intelligent Data Tiering Helps Customers Optimize Microsoft Azure Storage Consumption

The intelligence and logic that is built into Rubrik’s Instant Tiering and Smart Tiering technologies will help solve common problems and provide cost savings in the public cloud.

Tuesday 12/17

New Year, New User Experience: NVIDIA vGPU Enhances Virtualization, Adds 8K VDI Display Support

NVIDIA vGPU software delivers an improved user experience and the performance of the latest GPUs needed to run the most demanding graphics, AI and high performance computing workloads in virtualized environments.

2019 Was the Year of Zero Trust

Years after the death of the data center, 2019 was a reckoning in the importance of identity and access management.

Wednesday 12/18

Citrix Workspace Live for Google Cloud

With the latest release of Citrix Workspace, Google Cloud customers can incorporate the G Suite tools their employees prefer to use into an intelligent work feed and deliver productivity-boosting, time-saving microapps that integrate multiple workflows by automating and simplifying common tasks within minutes.

How Security Keeps Up When Developers Drive Open Source

CyberArk Conjur is an open source security service for controlling privileged access to critical systems. It works to secure secrets (i.e., passwords, SSH keys, certificates and API keys) used by non-human identities and users in CI/CD environments and across open source tools.

Thursday 12/19

30 years of ransomware: How one bizarre attack laid the foundations for the malware taking over the world

Slowly but surely, the ransomware attacks were shifting their focus, with many of the professional criminal organisations turning away from attacking home users in favour of targeting businesses and public sector organisations, encrypting entire networks and making off with tens of thousands of dollars.

Edge computing requires a change in performance monitoring

As you move applications to the edge, evaluate your options for monitoring performance there as well. The cost of implementing edge-oriented network packet brokers may not be as much as you think. You also may be able to leverage existing switches to run network visibility and performance monitoring solutions.

Friday 12/20

F5 to Acquire Shape Security, Transforming Application Security

Shape protects the largest banks, airlines, retailers, and government agencies with sophisticated bot, fraud, and abuse defense. In particular, Shape defends against credential stuffing attacks, where cybercriminals use stolen passwords from third-party data breaches to take over other online accounts.

8 Best Practices for Multi-Cloud Security

While a multi-cloud approach offers numerous benefits, there are some pitfalls to be aware of as well. This post will explore the pros and cons of multi-cloud usage, the unique security challenges it poses, and eight best practices to ensure your multi-cloud environment is properly secured.