When selecting VPN routers, small businesses want ones that support the VPN protocols they desire as well as ones that fit their budgets, are easy to use and have good documentation. We looked at five different models from five different vendors: Cisco, D-Link, and DrayTek, Mikrotik and ZyXEL. Our evaluation called for setting up each […]
Q&A: Jeff Wilbur of the Online Trust Alliance on why enterprise IoT security is a lot like BYOD
As consumer Internet of Things (IoT) devices inevitably find their way into the workplace, IT pros need to isolate them from the rest of the enterprise network, perhaps on a network of their own, so they don’t become backdoors exploitable by attackers, according to the head of the Online Trust Alliance. Jeff Wilbur, the director […]
The risks associated with global Internationalized Domain Names | Salted Hash Ep 36
Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals — and how to combat them.
Desktop transformation: the end of the monolithic enterprise desktop
In our shiny new digital world there is no place for the old monolithic desktops of the past. To be successful in their digital transformation, organisations should transform their enterprise desktops first. While server workloads are well managed and well architected, however, the same cannot be said for desktops. Instead we more frequently see situations […]
Don’t ignore application security | Salted Hash Ep 35
In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it’s just now getting more attention from security teams.
What Price Data Protection?
Andy Spencer, Solution Architect, DataCore Software, considers how RAID adoption in Flash doesn’t necessarily fit all. While it is undeniable that prudent organisations should take every possible step to protect their data, it’s worth questioning at what level and at what associated overhead should that protection take? Do the traditional ways of thinking about resilience […]
Trojan.AndroidOS.Loapi: What is this jack-of-all-trades malware?
[unable to retrieve full-text content]
Bromium introduces one-click use case deployment in Secure Platform 4.1
Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable security insights with interactive dashboards and reports Virtualization-based security has changed the way organizations approach the idea of protecting their intellectual property from […]
HCI or Not? Understand the Datrium solution in a 3 minutes read
As a newer market player that implements a game-changing architecture that accelerates applications, simplifies infrastructure management, and combine data protection in a single solution I am frequently asked what precisely Datrium does, and if Datrium is HCI or not. Is Datrium HCI or Not? A duality dilemma. If you view HCI as being the physical […]
Domain fronting: Why cloud providers are concerned about it
[unable to retrieve full-text content]