Hackers shut down infrastructure safety system in attack: FireEye

By CloudBuzz | December 14, 2017

Hackers shut down infrastructure safety system (Reuters) – Hackers likely working for a nation-state recently penetrated the safety system of a critical infrastructure facility in an attack that caused operations to shut down, according to cyber security firm FireEye Inc,

blockchain credit security

Is blockchain a solution for credit security?

By CloudTweaks | December 11, 2017

Blockchain Credit Security In the last 30 years, FICO scores were considered a reliable solution to measure creditworthiness and attach a risk score to each applicant. As the sub-prime mortgage crisis of 2008 proved it, this system was neither accurate

Don’t be held hostage by Ransomware: 7 Prevention Tips

By Cloud Syndicate | December 8, 2017

Ransomware Prevention Tips Ransomware can bring your business to its knees. Whether it comes as a system- or network-wide infection, it can do a severe damage to your company. Ransomware starts with malware that infects a system by using malicious

VMware and Carbon Black Fundamentally Transform Current Approaches to Data Center and Cloud Security

By CloudBuzz | December 7, 2017

New joint, cloud-based security solution combines enforcement of “known good” application behavior with advanced threat detection and automated remediation WALTHAM, MA and PALO ALTO, CA–(Marketwired – December 07, 2017) – VMware, Inc., (NYSE: VMW), a global leader in cloud infrastructure and business

The Department of Defense Cloud

Internet Association asks for U.S. net neutrality vote delay

By CloudBuzz | December 6, 2017

WASHINGTON (Reuters) – The Internet Association, whose more than 40 members include companies like Google and Amazon, urged the Federal Communications Commission on Wednesday to delay a vote to repeal a 2015 order banning internet providers from blocking or throttling

Breached Data

Breached Data – Keeping it Secret Doesn’t Make It Go Away

By Steve Prentice | December 6, 2017

Breached Data When Uber’s massive data breach made it to the public’s ears recently, it became a member of an infamous group of companies who not only had vital customer data stolen, but who sat on the story and did

VMware Introduces Major Update for Integrated Hybrid Cloud Platform

By CloudBuzz | December 5, 2017

VMware Introduces Major Update PALO ALTO, CA–(Marketwired – December 05, 2017) – VMware Cloud Foundation 2.3 Speeds Time to Deploy Hybrid Cloud by Adding Full Set of Cloud Management Capabilities Platform Now Automates Deployment and Configuration of VMware vRealize Automation,

Repeat After Me… Nobody Is Safe From Cyber Attacks

By Andrew Heikklia | December 1, 2017

Nobody Is Safe From Cyber Attacks The last couple of years have shown the world that seemingly nobody is safe from cyber attacks. The 2017 breach of Equifax was proof that now, even the common person should begin paying attention to

Inside story on HPC’s role in the Bridges Research Project at Pittsburgh Supercomputing Center

By Dana Gardner | November 30, 2017

The next BriefingsDirect Voice of the Customer high-performance computing (HPC) success story interview examines how Pittsburgh Supercomputing Center (PSC) has developed a research computing capability, Bridges, and how that’s providing new levels of analytics, insights, and efficiencies. We’ll now learn

Learning to Code is as Useful as Learning Ancient Greek

By John Pientka | November 29, 2017

Your children will be left behind if they don’t learn to code. Really? What if coding as we know it is already a dying language? What if most programs in the future will be coded by Artificial Intelligences? Where do

SECURITY

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a ...
Why Open Source Technology is the Key to Any Collaboration Ecosystem

Why Open Source Technology is the Key to Any Collaboration Ecosystem

Open Source Collaboration Ecosystem Open source – software whose source code is public and can be modified or shared freely ...
Chris Gerva

How to Avoid Becoming Another Cloud Security Statistic

Cloud Security Statistic Last year, Gartner predicted that, by 2020, 95 percent of all cloud security failures will be caused ...
Follow the Lead: 5 Data Security Tips Small Businesses Should Mimic From Larger Enterprises

Follow the Lead: 5 Data Security Tips Small Businesses Should Mimic From Larger Enterprises

Data Security Tips Small Businesses Should Mimic As more and more companies begin to switch to the cloud, cyber attacks ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
Your Biggest Data Security Threat Could Be....

Your Biggest Data Security Threat Could Be….

Biggest Data Security Threat Your biggest data security threat could be sitting next to you… Data security is a big ...
How IoT and OT collaborate to usher in the data-driven factory of the future

How IoT and OT collaborate to usher in the data-driven factory of the future

The Data-driven Factory The next BriefingsDirect Internet of Things (IoT) technology trends interview explores how innovation is impacting modern factories and supply chains ...
Four Trends and Realities Confronting Security Today

Four Trends and Realities Confronting Security Today

Realities Confronting Security Today, the number of attempted data breaches, cyber attacks, and other bad behavior by bad actors continues ...
Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all ...
Gartner’s Hype Cycle for Emerging Technologies, 2017 Adds 5G, Edge Computing For First Time

Gartner’s Hype Cycle for Emerging Technologies, 2017 Adds 5G, Edge Computing For First Time

Gartner’s Hype Cycle for Emerging Technologies Gartner added eight new technologies to the Hype Cycle this year including 5G, Artificial ...