Author Archives: Jessica Lyons Hardcastle
Author Archives: Jessica Lyons Hardcastle
The open source private cloud platform allows users to change their infrastructure to best suit individual workloads.
The company selling the software claims it will only sell it for legal uses. But the RAT gives buyers everything they need to build a botnet.
“HPE has been on the outside looking in with respect to cloud and China, and this solves both problems,” said analyst Zeus Kerravala.
The cloud service gives companies visibility and mobility across all of their secondary data and applications from a single dashboard. It also uses machine learning and analytics to power a bunch of new infrastructure management features.
Microsoft said it has used this approach 12 times in two years to shut down 84 fake websites associated with the state-sponsored hacking group called Fancy Bear.
Composable infrastructure — Dell EMC calls it “kinetic infrastructure” — treats networking, storage, and compute as fluid resource pools that can be composed and recomposed on the fly.
The open data center effort added Packet’s CEO as a board member and will soon sell Open19 compliant servers on its online marketplace.
Michael Wood took another emerging technology vendor, VeloCloud, to the top of the SD-WAN market. Apstra wants him to do the same for its company and intent-based networking.
The cloud giant also launched a reference architecture that companies can code into their existing marketplace to recommend new content or products.
Leading cloud access security broker (CASB) vendors McAfee and Bitglass talk security and cloud-native attacks at Black Hat.
While IoT malware made its top-three debut in July, cryptomining malware remained the top two offenders, according to the monthly report.
The flaws could allow hackers to access data that is supposed to be secured in protected areas on Intel’s Core chips or in the cloud. AMD says it's immune.
Armis surveyed security professionals at Black Hat and found 93 percent expect nation-states will target or exploit connected devices in the next year. So it really feels like an understatement to say IoT security was a hot topic at the event.
“We are on track to overtake Splunk and be the next SIEM market leader,” says CEO Nir Polak.
When asked to rank U.S. election security preparedness, Cisco’s director of threat management and incident response said “little to none.”
The security company that spun out of Alphabet’s secretive X research lab in January still hasn’t set a release date for its analytics platform.
On the sidelines at Black Hat, a Microsoft exec said the Tech Accord is an example of how the company works with other technology vendors to advance security.
During the Black Hat Keynote, Google’s Parisa Tabriz, who manages the Project Zero bug hunting team, urged tech companies to build coalitions to solve complex security problems.
"It’s somebody’s day job to make sure they exploit you and remain a presence on your network,” said Josh Ray, global cyber defense lead for Accenture Security.
The new service processing card can provide up to an 11-fold performance boost to Juniper’s SRX5000 line of firewalls compared to the earlier version, the company claims.