Tech Primers

How-tos, tech analysis and explanation

How to migrate existing applications to VMware NSX

Security policies will need to be adjusted, and identifying and designing the zones and tiers can be difficult

leap jump chance risk

study binary research technology code public domain

The key functions to consider when building or buying a log analysis platform

Adoption of the wrong log analysis platform might make matters worse

Using DNS to weaken Locky, the powerful ransomware threat

An anonymized feed of DNS queries, along with anomaly detection and correlation technology, makes it possible to identify suspected domains used by Locky to download encryption keys

crunching numbers

How to calculate the true cost of migrating to the cloud

Four steps to getting it right

future tech

Serverless computing’s future is now – and why you should care

Instead of allocating virtual machines in the cloud, you upload functions and let the IaaS service provider figure out how to deploy, run and scale those functions

Six runtime threat detection and response tips for container security

No matter how good a job you do with vulnerability scanning and container hardening, there are unknown bugs and vulnerabilities that may manifest in the runtime

avoiding mistakes

5 Common tech hiring mistakes to avoid

The consequences of getting it wrong can be substantial

savings cloud piggy bank

Savings in the cloud: How to find them and when to make your move

If you don’t have to re-platform applications, 45% of current instances would run 36% more cost effectively in the cloud

Secure applications, not the cloud

The application stack is the new perimeter

fail disaster

7 Reasons your cloud will fail

While cloud can lead to key benefits, make sure you avoid these costly mistakes

Maximizing use of existing cabling saves time, money and headaches

New media converters and extenders are available for most cable situations

05 cloudiness

Promoting cloud in a risk-averse organization

The Food and Agriculture Organization of the United Nations is locked into formal bureaucratic procedures and, by general standards, is highly risk-averse. In addition, like other organizations of the United Nations System, it has a...

Using big data for security only provides insight, not protection

Machine learning provides the protection big data analytics lack. Instead of figuring out why a breach happened after the fact, machine learning can identify a data breach as it’s happening

hadoop

DIY vs. fully integrated Hadoop – What’s best for your organization?

The trade-offs of building it yourself vs. going with a pre-integrated, out-of-the-box platform

analyze data graphs laptop user man worker

How Amazon Kinesis can help you leverage real-time data

Kinesis is a suite of tools that makes it easy to capture, process and analyze real-time streaming data

angry broken

IoT product development is broken – 6 ways developers and manufacturers can fix it

The burden of securing connected devices – and responsibility to find fixes when a vulnerability is exploited – falls squarely on product manufacturers and developers

ethernet

The Ethernet ecosystem today is driven by applications, not speed alone

Diverse applications in new and traditional industry verticals expand the Ethernet family

ransomware contained container

Use virtual containers to isolate ransomware

Keeping suspicious files and connections in a separate container – a virtual space isolated from the rest of the network – is a savvy strategy that can save you time and money

Identity verification: The New Turing Test

The irony is, the bad guys can often meet the current ID requirements better than actual customers

Load More