Insider threats and employee-owned devices identified as the greatest risks

New findings from network security management provider AlgoSec also indicate poor change management processes lead to network and application outages.

Read More

Belief in security breaches

A survey conducted recently by Lieberman Software Corporation reveals that more than 70% of IT security professionals would not be willing to bet $100 of their own money that their organization will not suffer a data breach in the next six months.

Read More

Truth and lies about latency in the Cloud

By Jelle Frank Van Der Swet, who manages the pan-European marketing and product development programme for Interxion’s sizeable and fast-growing cloud community.

Read More


Red Hat advances OpenStack Enterprise and Community technologies and roadmap

Red Hat, Inc. has announced updates to its OpenStack enterprise and community technologies and roadmap, including the advancement of its enterprise Red Hat OpenStack offering into an Early Adopter Program and the availability of RDO, a community-supported distribution of OpenStack that runs on Red Hat Enterprise Linux, Fedora and their derivatives. In addition, Red Hat has also announced Red Hat OpenStack Cloud Infrastructure Partner Network, a global ecosystem of technology and services...

Read More


Lessons from COVID-19 drives urgent need for better cybersecurity protection and remote work...
Latest Veeam update broadens platform support including Nutanix Prism integration, Proxmox VE...
PEAK:AIO and Stormgrid overcome traditional infrastructure limitations in AI workloads.
Nutanix has announced the continued evolution of its offerings across private and public clouds,...
With containers becoming the go-to choice for production deployment, Zerto has introduced the beta...
SCHAEFER GmbH, a global leader providing premium quality elevator components, is pleased with the...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more