Disruption of critical public services or data compromise can cost people their privacy, their livelihoods and sometimes even their lives. What IT security threats do enterprises have to deal with today? Large Organizations Not Yet Able to Secure their Complex IT Environments
With more than 75% of enterprise security breaches due to external threat actors, how can organizations apply intelligence and automation to augment digital defenses? The State of Digital Defense
Be aware that all public cloud providers are not alike. The Critical First Steps Towards Leveraging the Public Cloud to Meet Electronically Stored Information (ESI) Compliance Regulations
Fixing bottleneck issues is crucial and requires first identifying the underperforming component. Five Common Application Bottlenecks and Recommended Resolutions
Data virtualization is fast emerging as an architectural approach to quickly gain control over sensitive customer information stored across multiple systems. Protected by Design - How Data Virtualization Can Reduce Data Privacy Risk
Promisingly, security features and protections in the major public cloud platforms (AWS, Azure and GCP) have come a long way. Managing Cloud Infrastructure to Prevent Security Gaps
Perhaps the most obvious advantage of VM-based solutions is that multiple VM tenants can execute code on the same physical hardware. Challenges of Using Virtual Machines As Cloud Storage


I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security

RedLock debuts cloud security report to focus on shared responsibilities, finds cloud-related exposures at Tesla

RedLock, a cloud threat defense company, released Tuesday latest “Cloud Security Trends” report from the RedLock Cloud Security Intelligence (CSI) team, a group of elite security analysts, data scientists and data engineers, that uncovers serious threat vectors and highlights the need for shared responsibility for security within a public cloud environment. The RedLock CSI team also revealed that hackers infiltrated a public cloud environment owned by Tesla, which is involved […]


Mavenir joins with Dell EMC to offer expanded cloud-native NFV offerings; reduce costs and drive new revenue streams

Mobile network transformation company Mavenir collaborated on Thursday with Dell EMC OEM solutions to deliver a range of solutions for service providers and enterprises covering 5G Cloud RAN, Packet Core, IoT, VoLTE, VoWiFi and RCS on Mavenir’s cloud-native Open Stack NFV and container CloudRange platform. Communications service providers are under intense pressure to simultaneously drive new revenue streams and aggressively reduce costs as OTTs gain market share in voice and […]

Hot Companies

Cool Products


Red Hat Decision Manager 7 helps organizations automate business decisions for efficient operations, accurate outcomes

Red Hat, provider of open source solutions, introduced on Wednesday Red Hat Decision Manager 7, a decision management platform that simplifies the development and deployment of rules-based applications and services. Red Hat Decision Manager 7 is the next generation of the company’s business rules management offering, Red Hat JBoss BRMS, and is designed to enable organizations to build applications that automate business decisions. Red Hat Decision Manager 7 delivers an […]

Data Backup

New McAfee global cybersecurity report reveals cybercrime takes close to $600 billion toll on worldwide economy

McAfee, in partnership with the Center for Strategic and International Studies (CSIS), released on Wednesday a global report that focuses on the significant impact that cybercrime has on economies worldwide. The report concludes that cybercrime costs businesses close to $600 billion, or 0.8 percent of global GDP, which is up from a 2014 study that put global losses at about $445 billion. The report attributes the growth over three years […]

Data Storage

Riverbed SD-WAN offers enhanced cloud connectivity, integrated Xirrus Wi-Fi for a cloud-to-edge networking offering

Riverbed Technology announced on Wednesday major updates to its SD-WAN and cloud networking solution, SteelConnect, the first and only SD-WAN solution that provides unified connectivity and policy-based orchestration spanning the entire distributed network fabric – hybrid WAN, branch LAN/WLAN, data centers, and the cloud. With the latest upgrades to SteelConnect, Riverbed is expanding the power of one-click connectivity and optimization into AWS and Microsoft Azure with added support for AWS […]

Data Protection

Corelight blends with Elasticsearch to deliver incident response, threat hunting with Elastic Stack

Corelight, provider of network visibility solution for cybersecurity, announced on Wednesday product integration with distributed and real time search engine Elasticsearch. Now organizations can import Corelight network logs directly to Elasticsearch, which makes the Elastic Stack a powerful platform for incident response and threat hunting. The integration is part of Corelight’s latest software release, version 1.13 and delivers native integration with the Elasticsearch API, offering a streamlined Corelight log export […]

WWPI – Covering the best in IT since 1980