Signature Update #2547
  • Published in

Signature Update #2547 129 new signatures:HIGHHTTP: Blackhole Exploit Kit Landing Page RequestedHIGHHTTP: Bleeding Life Exploit Kit Module Call 11HIGHHTTP: Bleeding Life Exploit Kit Module Call 10HIGHHTTP: Bleeding Life Exploit Kit Module Call 9HIGHHTTP: Bleeding...

Read More
SRX and LN series platforms complete Common Criteria Certification and are listed on the NIAP Product Compliant List
  • Published in

SRX and LN series platforms complete Common Criteria Certification and are listed on the NIAP Product Compliant List    Juniper Networks SRX and LN series platforms complete Common Criteria Certification and are listed on the NIAP Product Compliant List as...

Read More
Signature Update #2546
  • Published in

Signature Update #2546 181 new signatures:HIGHHTTP: Eleanore Exploit Kit Exploit Fetch RequestHIGHHTTP: Eleanore Exploit Kit PDF Exploit Page RequestHIGHHTTP: Eleanore Exploit Kit Post-exploit Page RequestHIGHHTTP: Crimepack Exploit Kit Control Panel AccessHIGHHTTP:...

Read More
FireEye Myth and Reality
  • Published in

Some tech companies are always associated with their first acts. Dell just acquired my first employer, EMC Corporation, in order to expand its enterprise portfolio, yet the company will always be linked with personal computers and its founder’s dorm room. F5 has become a nexus that brings...

Read More
Did Dell and EMC Just Simplify the Enterprise Mobility Strategic Decision Making Process?

The fact that major IT vendors are consolidating isn’t a surprise, given the feedback we hear...

Read More
Pentahos Three-Legged Race to Big Data (with HDS)

Pentaho World 2015 was held in sunny Orlando this year, with over 500 attendees, and was by all...

Read More
Amazon Workspaces Delivery Compelling Usage Scenarios

I use Amazon Workspaces on my iPad Mini and have been impressed with its usability. While I admit...

Read More
Hybrid Clouds and Cybersecurity Front and Center at AWS re:Invent

The contrast of the DJ music pumping out bass lines and drum beats over hits from the 70s was quite...

Read More
Is Public Cloud in Dells Cards Post EMC Acquisition?

With the tech world all abuzz about the blockbuster Dell buyout of EMC, a few thoughts on what the...

Read More
The Haystack Problem

Organizations lack sufficient collect and compute resources to arrive at accurate conclusions about...

Read More
Run DeMC: Dell & EMC merge to thrive in the cloud era

Dell recently announced its intent to acquire EMC at approximately $33.15 a share, for a total...

Read More
Automated Traffic Visibility for Software Defined Data Centers using VMware NSX Dynamic Service Insertion

Another week, another advancement in GigaSECURE Security Delivery Platform from Gigamon, the leader...

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, explains how enterprises should be thinking about their cyber security strategy today, the difference between the next-generation and traditional approaches...
Eric Herzog, Chief Marketing Officer at Infinidat, discusses next-generation data protection and recovery-first cyber resilience and threat detection strategies; the AI opportunity – How the right storage is...
Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Eric Herzog, Chief Marketing Officer at Infinidat, explains how storage can improve an enterprise’s environmental footprint.

News

xtype unveils a platform to bridge governance gaps in ServiceNow, enhancing compliance and efficiency for enterprises.
Discover how Zendesk's new AI-driven features are transforming customer service through advanced automation and analytics.
CyXcel's research reveals that a lack of trust in third-party vendors leaves UK businesses exposed to escalating digital threats.
Agentic AI offers vast economic potential, but trust and human collaboration are essential for effective deployment and scaling.