Why Cyber Risk Management Must be Everybody’s Business
Keeping Personal Health Information Secure in an Era of Cyberattacks
Five Symptoms of Data Prep Deficiency
Embrace “Responsible Encryption" and Rise Above the Privacy vs. Security Debate
Hacktivism – Are We Powerless to Stop it?
The Role of Administrative Controls in Data Security and Privacy
How to Run Successful Load Tests

CEO CORNER

I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security
SSD-750-EVO-500GB_Main_1

Samsung Electronics enhances 750 EVO SSD with global availability; increases capacity to 500GB

Samsung Electronics launched Tuesday global availability of the 750 EVO solid state drive (SSD) in 120GB, 250GB and an all new 500GB capacity. The 750 EVO SSDs provide mainstream consumers and PC builders with an efficient migration path from hard disk drives (HDDs) or slow performing entry-level SSDs to a faster and more reliable storage solution for regular computer use. Extending Samsung’s technology in memory solutions, the 750 EVO SSDs […]

Cloud
CjZi3W1VEAAYdc3

CrowdStrike introduces open source Falcon Orchestrator with improved workflow automation; executing security forensics

CrowdStrike, a vendor of cloud-delivered endpoint protection, threat intelligence and response services, announced this week availability of CrowdStrike Falcon Orchestrator, an open source tool built on CrowdStrike’s Falcon Connect APIs. The unveiling of Falcon Orchestrator is part of CrowdStrike’s Spring release of new solutions and services which also includes introducing an updated and expanded set of APIs for the CrowdStrike Falcon Platformalong with next-generation antivirus features providing new ransomware protection […]

Hot Companies

Cool Products

Virtualization
aws_logo_web_300px

AWS offers X1 instances for Amazon EC2 to support in-memory databases, big data processing, HPC

Amazon Web Services (AWS), an Amazon.com company, announced this week availability of X1 instances, a new memory optimized instance for Amazon Elastic Compute Cloud (Amazon EC2) where X1 instances offer 2 TB of memory, so as to run in-memory databases. Powered by four 2.3 GHz Intel Xeon E7 8880 v3 (Haswell) processors delivering 128 vCPUs, X1 instances also offer up to 10Gb per second of dedicated bandwidth to Amazon Elastic […]

Data Backup
2016-05-23-20-15-21-2125829935

JFrog launches Xray, its new product to give enterprises a new standard of transparency, impact analysis

JFrog debuted Monday its fourth and newest product, JFrog Xray that gives organizations visibility into the contents of software components. The announcement – made at swampUP, JFrog’s annual user conference – represents a major advancement in improving development and DevOps and InfoSec teams’ effectiveness, and accelerating the continuous delivery (CD) pipeline. JFrog Xray has the ability to peel back the layers of software components and their accompanying metadata, to uncover […]

Data Storage
cray_logo

New Cray Urika-GX system tackles supercomputing performance to address big data analytics

Cray Inc. launched Tuesday its agile analytics platform Urika-GX system to fuse supercomputing technologies with an open, enterprise-ready software framework for big data analytics. The Cray Urika-GX system gives customers versatility for running multiple analytics workloads concurrently on a single platform that leverages the speed of a Cray supercomputer. The size, scope, and complexity of big data analytics is exploding and creating problems for customers who are already struggling with […]

Data Protection
aws_logo_web_300px

AWS updates Amazon ElastiCache to export Redis snapshots to S3

Amazon Web Services (AWS) announced this week support that Amazon ElastiCache will support the Memcached and Redis in-memory caching engines. While Memcached is generally used to cache results from a slower, disk-based database, Redis is used as a fast, persistent key-value store. It uses replicas and failover to support high availability, and natively supports the use of structured values. With its new features, Redis users will have the ability to […]

WWPI – Covering the best in IT since 1980