Not so long ago, the phrase “consumerization of IT” was on everyone’s lips. Whole publications and conferences (remember CITE, for Consumerization of IT in the Enterprise?) were created to chronicle the trend of corporations relying on products and services originally created for consumers — which was often easier to use and of higher quality than […]
Honeypots and the evolution of botnets | Salted Hash Ep 23
Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving.
Is it time to kill the pen test? | Salted Hash Ep 22
Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping companies improve their defenses.
One in five serverless apps has a critical security vulnerability
Serverless computing is an emerging trend that is likely to explode in popularity this year. It takes the idea of a smaller server footprint to the next level. First, there were virtual machines, which ran a whole instance of an operating system. Then they were shrunk to containers, which only loaded the bare minimum of […]
Cisco broadens Tetration security delivery with cloud, virtual buying options
Cisco has added new cloud and virtual deployment options for customers looking to buy into its Tetration Analytics security system. Cisco’s Tetration system gathers information from hardware and software sensors and analyzes it using big-data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. [ Don’t miss customer […]
IBM tweaks its z14 mainframe to make it a better physical fit for the data center
IBM is widening its mainframe range with some narrower models – ZR1 and Rockhopper II – that are skinny enough to fit in a standard 19-inch rack, which will answer criticisms of potential customers that the hulking z14 introduced in July 2017 too big to fit in their data centers (see photo above). In addition […]
Network-as-a-Service: A modern solution to today’s networking challenges
Traditional networking architectures over the past two decades or so prescribe that the hub of the network be build around a specific location, such as a data center or a company’s headquarters building. This location houses most of the equipment for compute, storage, communications, and security, and this is where enterprise applications are traditionally hosted. […]
Malicious IoT hackers have a new enemy
IoT security is about the farthest thing from a laughing matter in the world of technology today, threatening global trade, privacy and the basic infrastructure of modern society. So you could be forgiven for being taken aback that the newest defender of vulnerable systems against bad actors looks a little like Johnny 5 from the […]
7 free tools every network needs
“I am all about useful tools. One of my mottos is ‘the right tool for the right job.’” –Martha Stewart If your “right job” involves wrangling computer networks and figuring out how to do digital things effectively and efficiently or diagnosing why digital things aren’t working as they’re supposed to, you’ve got your hands full. […]
People are really worried about IoT data privacy and security—and they should be
A new study from the Economist Intelligence Unit (EIU) shows that consumers around the world are deeply worried about in how their personal information is collected and shared by the Internet of Things (IoT). But let’s be honest, the problem isn’t that unsophisticated consumers are panicking for no reason. In fact, consumers are merely picking […]