Shared, block storage SANs have been the exclusive domain of big, centralized storage arrays, but distributed systems are about to crash the party.
Network Computing
Virtual SANs: Scale Out’s Next Iteration
Comments Off
Categories: General.
Evernote Breach: What It Means To Enterprise IT
By now, you have heard about the latest in SaaS security woes: Evernote. As a user of the service, I was notified of the breach on Saturday. Evernote’s systems were compromised to the extent that individuals were able to access user information, which included encrypted passwords. Unlike the LinkedIn breach, where the passwords were encrypted, but not “salted” (which provides protection against brute force dictionary attacks,) Evernote’s passwords were both encrypted and salted. Evernote, correctly in my view, decided to implement a system-wide password reset, even though there was no evidence of a breach of customer content or credit card information. But this episode does have me thinking about a couple of things.
Comments Off
Categories: General.
4 Big BYOD Trends For 2013
Last year, research firm Gartner heralded the bring-your-own-device, or BYOD, phenomenon as the “most radical shift in enterprise client computing since the introduction of the PC.” Such headlines often smack of hyperbole but so far, BYOD has lived up to expectations.
Comments Off
Categories: General.
Next Generation Firewalls 101
Next generation firewalls combine application awareness and deep packet inspection to give companies more control over applications while also detecting and blocking malicious threats.
Network Computing
Comments Off
Categories: General.
HP Launches Big Data Security Products, Threat Research
HP this week released new big data tools designed to provide businesses with better information security intelligence gathering capabilities, and launched a new information security research group that’s been tasked with providing better threat intelligence for HP’s own security products.
Comments Off
Categories: General.
Stuxnet, The Prequel: Earlier Version Of Cyberweapon Discovered
SAN FRANCISCO — RSA CONFERENCE 2013 – Researchers at Symantec have identified an earlier version of the Stuxnet malware that shows that the cyberattacks on Iran’s Natanz nuclear plant date back as early as 2005 and targeted another piece of uranium-enrichment equipment.
Comments Off
Categories: General.
11ac’s First Wave: What to Expect
802.11ac will super-charge Wi-Fi, but pre-standard products will come with limitations. Here’s what you can expect as 11ac products debut in 2013.
Network Computing
Comments Off
Categories: General.
WLAN Stress Tests: What’s the Use?
Wireless hardware testing can shed much-needed light on Wi-Fi products when every vendor claims to have the best stuff. But you have to pay attention to the testing details.
Network Computing
Comments Off
Categories: General.
Will SDN Kill TRILL?
Layer 2 multipathing standards such as TRILL and SPB may seem redundant in an SDN world. But these standards still have a role to play while we wait to see how the SDN market matures.
Network Computing
Comments Off
Categories: General.
New security tool serves Amazon Cloud users
For many IT managers, moving your company’s backbone to the cloud brings a certain sense of freedom. However, the task of caring for and protecting your assets remains. After all, the operative word in “virtual server” is “server”; virtual or not, it’s still a fully functioning server from an operational sense, carrying the same risks and vulnerabilities inherent in physical servers. You’ll need vulnerability management tools to ensure those servers are secure.
Comments Off
Categories: General.
