John Edwards

Author Archives: John Edwards

6 top network security threats and how to beat them

It's a war zone out there. In the seemingly endless game of cyber cat and mouse, accurate intelligence remains the best tool for beating attackers at their own game.Here's an analysis of today's six top network threats and tips for how to identify and quash them.1. Ransomware Ransomware is easily the greatest network threat, since it gives attackers the biggest bang for the buck with a relatively low probability of getting caught. "There's also a low bar in the skill category to break into this sort of thing," says Andy Rogers, a senior assessor at cybersecurity and compliance firm Schellman. "There are plenty of Ransomware-as-a-Service (RaaS) businesses that will be more than willing to ensure you have the tools you need to unleash a ransomware campaign."To read this article in full, please click here

6 top network security threats and how to beat them

It's a war zone out there. In the seemingly endless game of cyber cat and mouse, accurate intelligence remains the best tool for beating attackers at their own game.Here's an analysis of today's six top network threats and tips for how to identify and quash them.1. Ransomware Ransomware is easily the greatest network threat, since it gives attackers the biggest bang for the buck with a relatively low probability of getting caught. "There's also a low bar in the skill category to break into this sort of thing," says Andy Rogers, a senior assessor at cybersecurity and compliance firm Schellman. "There are plenty of Ransomware-as-a-Service (RaaS) businesses that will be more than willing to ensure you have the tools you need to unleash a ransomware campaign."To read this article in full, please click here

Edge computing moves toward full autonomy

Edge computing is rapidly shedding its reputation as a fringe concept, and both adopters and vendors are focusing their sights on the technology's next goal: fully autonomous deployment and operation.The edge deployment experience is drawing closer to the simplicity of unboxing a new mobile phone, says Teresa Tung, cloud first chief technologist at IT advisory and consulting firm Accenture. "We're seeing automated technology that simplifies handling the edge’s unique complexity for application, network, and security deployments."The ability to create and manage containerized applications enables seamless development and deployment in the cloud, with the edge simply becoming a specialized location with more stringent resource constraints, Tung says. "Self-organizing and self-healing wireless mesh communications protocols, such as Zigbee, Z-Wave, ISA100.11a, or WirelessHART can create networks where devices can be deployed ad hoc and self-configure."To read this article in full, please click here

Edge computing moves toward full autonomy

Edge computing is rapidly shedding its reputation as a fringe concept, and both adopters and vendors are focusing their sights on the technology's next goal: fully autonomous deployment and operation.The edge deployment experience is drawing closer to the simplicity of unboxing a new mobile phone, says Teresa Tung, cloud first chief technologist at IT advisory and consulting firm Accenture. "We're seeing automated technology that simplifies handling the edge’s unique complexity for application, network, and security deployments."The ability to create and manage containerized applications enables seamless development and deployment in the cloud, with the edge simply becoming a specialized location with more stringent resource constraints, Tung says. "Self-organizing and self-healing wireless mesh communications protocols, such as Zigbee, Z-Wave, ISA100.11a, or WirelessHART can create networks where devices can be deployed ad hoc and self-configure."To read this article in full, please click here

NaaS adoption will thrive despite migration challenges

Network-as-a-service (NaaS) is gaining momentum, providing a subscription-based model that eliminates the need for enterprises to own, build, and maintain their own network infrastructure. By replacing conventional hardware-centric VPNs, firewall appliances, load balancers, and MPLS connections, NaaS technology promises adopters the ability to rapidly scale up and down in lockstep with demand while eliminating hardware costs and bolstering network security and service levels.To read this article in full, please click here

How to right-size edge storage

Edge computing is shaping up as the most practical way to manage the growing volume of data being generated by remote sources such as IoT and 5G devices.A key benefit of edge computing is that it provides greater computation, network access, and storage capabilities closer to the source of the data, allowing organizations  to reduce latency. As a result, enterprise are embracing the model: Gartner estimates that 50% of enterprise data will be generated at the edge by 2023, and PricewaterhouseCoopers predicts the global market for edge data centers will reach $13.5 billion in 2024, up from $4 billion in 2017. To read this article in full, please click here

1 2 3 5