Archive

Category Archives for "Networking"

People, process and technology challenges with security operations

These days, it’s tough for any organization to keep up with cybersecurity operations. Why? Well, the bad guys are pretty persistent for starters, launching a blitzkrieg of attacks and new types of exploits all the time. OK, hackers are relentless, but we’ve always know this, and their behavior isn’t likely to change anytime soon. What’s really disturbing, however, is that a lot of problems associated with cybersecurity are based upon our own intransigence. And organizations aren’t struggling with one issue, rather cybersecurity operations challenges tend to be spread across people, processes and technology. When it comes to security operations, it’s kind of a "death by a thousand cuts" situation. To read this article in full or to leave a comment, please click here

People, process and technology challenges with security operations

These days, it’s tough for any organization to keep up with cybersecurity operations. Why? Well, the bad guys are pretty persistent for starters, launching a blitzkrieg of attacks and new types of exploits all the time. OK, hackers are relentless, but we’ve always know this, and their behavior isn’t likely to change anytime soon. What’s really disturbing, however, is that a lot of problems associated with cybersecurity are based upon our own intransigence. And organizations aren’t struggling with one issue, rather cybersecurity operations challenges tend to be spread across people, processes and technology. When it comes to security operations, it’s kind of a "death by a thousand cuts" situation. To read this article in full or to leave a comment, please click here

People, Process, and Technology Challenges with Security Operations

These days, it’s tough for any organization to keep up with cybersecurity operations.  Why?  Well the bad guys are pretty persistent for starters, launching a blitzkrieg of attacks and new types of exploits all the time. Okay, hackers are relentless but we’ve always know this and their behavior isn’t likely to change anytime soon.  What’s really disturbing however is that a lot of problems associated with cybersecurity are based upon our own intransigence.  And organizations aren’t struggling with one issue, rather cybersecurity operations challenges tend to be spread across people, processes and technology.  When it comes to security operations, it’s kind of a ‘death by a thousand cuts’ situation. To read this article in full or to leave a comment, please click here

IDG Contributor Network: NetOps: Can networks be both available and agile?

Do you believe in a future where the leading source of value creation is through the experience of digital connections? If you don’t, you may want to compare the growth and value of AirBnB with many of the world’s largest hotel chains. And don’t think that this is a phenomenon limited to certain industries—evidence is mounting that across the landscape of public and private sectors, and across every industry segment, the future of business is digital business.To read this article in full or to leave a comment, please click here

IDG Contributor Network: NetOps: Can networks be both available and agile?

Do you believe in a future where the leading source of value creation is through the experience of digital connections? If you don’t, you may want to compare the growth and value of AirBnB with many of the world’s largest hotel chains. And don’t think that this is a phenomenon limited to certain industries—evidence is mounting that across the landscape of public and private sectors, and across every industry segment, the future of business is digital business.To read this article in full or to leave a comment, please click here

Dridex gang uses unpatched Microsoft Word exploit to target millions

The gang behind the Dridex computer trojan has adopted an unpatched Microsoft Word exploit and used it to target millions of users.The exploit's existence was revealed Friday by security researchers from antivirus vendor McAfee, but targeted attacks using it have been happening since January. After McAfee's limited public disclosure, researchers from FireEye confirmed having tracked the attacks for several weeks as well.The exploit takes advantage of a logic bug in the Windows Object Linking and Embedding (OLE) feature of Microsoft Office. It allows attackers to embed malicious code inside of Microsoft Word documents, with the code automatically executed when those files are opened.To read this article in full or to leave a comment, please click here

Dridex gang uses unpatched Microsoft Word exploit to target millions

The gang behind the Dridex computer trojan has adopted an unpatched Microsoft Word exploit and used it to target millions of users.The exploit's existence was revealed Friday by security researchers from antivirus vendor McAfee, but targeted attacks using it have been happening since January. After McAfee's limited public disclosure, researchers from FireEye confirmed having tracked the attacks for several weeks as well.The exploit takes advantage of a logic bug in the Windows Object Linking and Embedding (OLE) feature of Microsoft Office. It allows attackers to embed malicious code inside of Microsoft Word documents, with the code automatically executed when those files are opened.To read this article in full or to leave a comment, please click here

Cisco fortifies storage throughput, analytics

Cisco this week took the wraps off several products aimed at helping existing Fibre Channel customers grow the speed, capacity and management of their storage environments.In particular, Cisco rolled out a 32Gb Fibre Channel module for its MDS 9700 storage switch family with baked-in storage networking analytics, a 32Gb Fibre Channel Host Bus Adapter for the rack-mounted Cisco UCS C-Series server, as well as non-volatile memory express (NVMe) over FC support for flash memory appliances.To read this article in full or to leave a comment, please click here

Cisco fortifies storage throughput, analytics

Cisco this week took the wraps off several products aimed at helping existing Fibre Channel customers grow the speed, capacity and management of their storage environments.In particular, Cisco rolled out a 32Gb Fibre Channel module for its MDS 9700 storage switch family with baked-in storage networking analytics, a 32Gb Fibre Channel Host Bus Adapter for the rack-mounted Cisco UCS C-Series server, as well as non-volatile memory express (NVMe) over FC support for flash memory appliances.To read this article in full or to leave a comment, please click here

Apple is developing its own power management chips, says analyst

It appears that Apple is developing its own power management chips, according to a report from German private bank Bankhaus Lampe. The release of the report Tuesday led to a sharp drop in the shares of Dialog Semiconductor, the current supplier of these chips to the iPhone maker.“The teams of both companies collaborate very closely and thus, Dialog cannot be replaced by a third-party supplier. However, Apple itself could replace Dialog,” wrote analyst Karsten Iltgen.As evidence, the report cited 16 different job openings on Apple’s website for analog/power management engineers for the design center in Munich alone.“A search on social networks such as LinkedIn revealed that Apple has already poached about 20 chip designers, some of them with long-standing experience, from Dialog,” said the report, which estimates that about 40 power-management chip engineers are currently working at the design center in Munich, with a similar number working in the area at the center in California.To read this article in full or to leave a comment, please click here

Inside look at Hewlett Packard Enterprise’s next-generation infrastructure

In the 18 months since the company split from its sister consumer business, Hewlett Packard Enterprise has been in an almost constant state of refining its strategy.The company backed out of the public cloud market; sold off its Enterprise Services Business to competitor CSC for $8.5 billion; dealt other “non-core” assets to Micro Focus in an $8.8 billion deal; and dumped its OpenStack and Cloud Foundry development efforts off to Suse. HPE also bought all-flash storage vendor Nimble storage for $1 billion last month and snapped up hyperconverged infrastructure vendor Simplivity for another $650 million in January.To read this article in full or to leave a comment, please click here

Inside look at Hewlett Packard’s next-generation infrastructure

In the 18 months since the company split from its sister consumer business, Hewlett Packard Enterprise has been in an almost constant state of refining its strategy.The company backed out of the public cloud market; sold off its Enterprise Services Business to competitor CSC for $8.5 billion; dealt other “non-core” assets to Micro Focus in an $8.8 billion deal; and dumped its OpenStack and Cloud Foundry development efforts off to Suse. HPE also bought all-flash storage vendor Nimble storage for $1 billion last year and snapped up hyperconverged infrastructure vendor Simplivity for another $650 million in January.To read this article in full or to leave a comment, please click here

Inside look at Hewlett Packard Enterprise’s next-generation infrastructure

In the 18 months since the company split from its sister consumer business, Hewlett Packard Enterprise has been in an almost constant state of refining its strategy.The company backed out of the public cloud market; sold off its Enterprise Services Business to competitor CSC for $8.5 billion; dealt other “non-core” assets to Micro Focus in an $8.8 billion deal; and dumped its OpenStack and Cloud Foundry development efforts off to Suse. HPE also bought all-flash storage vendor Nimble storage for $1 billion last month and snapped up hyperconverged infrastructure vendor Simplivity for another $650 million in January.To read this article in full or to leave a comment, please click here

Managing the Cloud Network: CPM or APM?

CPM or APM We all know the future of enterprises is in flux with the consolidation or demise of Avaya/Nortel, Brocade/Foundry, Force 10, H3C and BNT assets. This speaks to the major trend of enterprise applications migrating to the cloud, any cloud be it public, private or hybrid. As this rapid transition prevails with efficiencies and scale, traditional applications and... Read more →

Data centers decline as users turn to rented servers

Data centers are declining worldwide both in numbers and square footage, according to IDC -- a remarkable change for an industry that has seen booming growth for many years.Users are consolidating data centers and increasingly renting server power. These two trends are having a major impact on data center space.[ Further reading: The march toward exascale computers ] The number of data centers worldwide peaked at 8.55 million in 2015, according to IDC. That figure began declining last year, and is expected to drop to an expected 8.4 million this year. By 2021, the research firm expects there to be 7.2 million data centers globally, more than 15% fewer than in 2015.To read this article in full or to leave a comment, please click here

Data centers decline as users turn to rented servers

Data centers are declining worldwide both in numbers and square footage, according to IDC -- a remarkable change for an industry that has seen booming growth for many years.Users are consolidating data centers and increasingly renting server power. These two trends are having a major impact on data center space.[ Further reading: The march toward exascale computers ] The number of data centers worldwide peaked at 8.55 million in 2015, according to IDC. That figure began declining last year, and is expected to drop to an expected 8.4 million this year. By 2021, the research firm expects there to be 7.2 million data centers globally, more than 15% fewer than in 2015.To read this article in full or to leave a comment, please click here

IDG Contributor Network: DevOps—The path to sustainable competitive advantages

A fundamental shift is happening in software development, and the way applications are built and brought to market is changing rapidly. As IT infrastructure has moved to the cloud and the age of the customer has made digital experiences pivotal in creating competitive advantages, DevOps has emerged. IT has refocused from managing servers to supporting lines of business managers and developers in their quest to provide integrated experiences across devices and touchpoints.+ Also on Network World: How DevOps can redefine your IT strategy + This shift can be compared to Henry Ford's innovation of the assembly line. Ford was able to set up a process that could produce more reliable cars faster and at lower costs. Similarly, the future of digital experiences belongs to the companies that can standardize and optimize their app delivery process. Companies that are able to align DevOps stratigeis and tools to deliver digital experiences faster and better than their competition have an advantage that will be difficult to replicate.To read this article in full or to leave a comment, please click here