Welcome!


From the Blogosphere

The newer Windows 10 devices with the Hello extensions are definitely going to have a cost implication, but in today’s context in our own consumer world where every individual has access to Smartphones with advanced biometric features, why should the enterprise user continue to use the...
Enabling patient-doctor trust goes a long way in a provider’s ability to provide care. Trust is also critical for enabling network connections that are safe, to help secure health networks. The healthcare industry is scrambling to shore up defenses as cyberattacks and breaches increas...
Does a Content Delivery Network (CDN) protect against Distributed Denial of Service (DDoS) attacks? It’s a good question. A CDN by its very nature will absorb DDoS attacks for the content that it serves and this could be considered protection but, as is often the case, this is only the...
Analysis of 25,000 applications reveals 6.8% of packages/components used included known defects. Organizations standardizing on components between 2 - 3 years of age can decrease defect rates substantially. Open source and third-party packages/components live at the heart of high velo...
Phishing has been around since the dawn of the internet. The term was first used in an AOL Usenet group back in 1996 but it wasn’t until 2003 when many baited hooks and lures started dropping. Popular transaction destinations like PayPal and eBay were some of the early victims of these...
It was a Monday. I was reading the Internet. Okay, I was skimming feeds. Anyway, I happened across a title that intrigued me, “Stateful Apps and Containers: Squaring the Circle.” It had all the right buzzwords (containers) and mentioned state, a topic near and dear to this application ...
It is impossible to go outside and not notice banks offering consumers new ways to save, send, spend, and access their money at a bank. This trend-to ease access to funds – extends well beyond the retail banking sector and is equally prevalent among investment banks, private banks, hed...
With all the excellent training available on television today, we are all now well prepared to deal with the coming Zombie Apocalypse. Our failure as a society lies, however, in our misunderstanding of the nature of the cybersecurity challenge. This failure threatens us all and our su...
The hype around data breaches in the health industry may seem commonplace and cause complacency. Last year, it was Anthem and Premera Blue Cross suffering attacks affecting nearly 90 million people combined. Among others, last month it was Banner Health – a nationwide health system bas...
Our walls of security prevention are actually being surmounted every day – we just don’t always know it. Assaults from within the network, as well as zero-day threats, are driving new types of solutions referred to as “advanced threat detection” (ATD). ATD brings in real-time packet ca...
With emerging ideas, innovation, and talents, the lines between DevOps, release engineering, and even security are rapidly blurring. I invite you to sit down for a moment with Principle Consultant, J. Paul Reed, and listen to his take on what the intersection between these once individ...
Privileged Identity Management (PIM) is the lowest common denominator in today’s most treacherous corporate and governmental security breaches. Or more accurately: Privilege Mismanagement. Sony, Target, Anthem, JP Morgan Chase, the city of San Francisco and many others succumbed to the...
In a series of articles, I am going to share my thoughts on the state of IT infrastructure and how we've arrived with current architecture trends. The topic today is SAN. Storage Area Networking (SAN) is a technology that solved a real problem that existed a couple decades ago. SANs h...
A cybersecurity transformation discussion on how cloud security is rapidly advancing, and how enterprises can begin to prevail over digital disruption by increasingly using cloud-defined security. We'll examine how a secure content collaboration services provider removes the notion of...
The growing popularity of IoT has spawned the debate on privacy once again. Last year, Samsung stoked controversy by warning customers that their Smart TV Voice Recognition system was capable of “listening” to personal and sensitive information spoken by customers. Not only this, all o...
2020 seems to be an important milestone for the Internet of Things. That’s the year that Cisco says there will be 50 billion connected devices and also the year Gartner notes that over 50% of major new business processes and systems will incorporate some element of the Internet of Thin...
In the business world, it’s hard to throw a rock without hitting a compliance requirement. All must be obeyed, but some call for a high level of control and auditability. Governing bodies are exerting their authority like never before, increasing the number of auditors and handing out ...
As cloud security is rapidly advancing, enterprises can begin to prevail over digital disruption by increasingly using cloud-defined security. The next BriefingsDirect cybersecurity innovation and transformation panel discussion explores how cloud security is rapidly advancing, and ho...
As the Big Data marketplace moves closer to a point of mass-maturity, business leaders have begun to take new approaches to implementation and utilization. Advanced analytics solutions have made their way into a range of industries and regions, and companies that successfully align the...
If you’ve been following along the DevCentral team’s journey toward F5 Certification, then you may be aware that we were in Chicago last week for F5’s Agility 2016 conference and took our 101 Application Delivery Fundamentals exam. I am happy to report that all of us, Jason, John, Chas...
I just had to write an Olympic-themed headline, since today is the first day of the 2016 Summer Games! I love the Olympics. It's so much fun watching athletes do what they're best at. Plus, they have the extra challenge this year of swimming or boating in polluted, mucky water-so it's ...
Although security is one of the most talked about topics in the IT channel today, there’s a widespread lack of education and awareness in the workplace. Small and medium-sized businesses (SMBs) are welcoming more technology into their everyday environment, but the rapid development of ...
Traditional infrastructure purchasing plans to over-provision for growth were based on the pain of scaling-out classic infrastructure architecture. Modern infrastructure solutions like hyperconverged infrastructure take away the pain of scaling out and allow IT departments to purchase ...
It took some time but the need for Total Security Management is slowly starting to sink in. With regard to quality it took the western manufacturing industry several decades before it realized that a separate quality department – standing at the end of the production line to check whic...
In September 2014, Apple made encryption default with the introduction of the iPhone 6. Then, in February 2016, a Los Angeles judge issued an order to Apple to help break into the encrypted iPhone belonging to a terrorist involved in a mass shooting. Apple had used some of the strong...
Experts are debating whether the Democratic National Committee’s (DNC) email system was hacked by the Russian military intelligence service (G.R.U.) or Guccifer 2.0, a lone wolf Romanian hacker. While this is a very important question, the answer will not change the results: over 20,00...
More than 95 percent of the world’s enterprises rely on SSH user keys to provide administrators and developers an effective means of gaining encrypted access to critical infrastructure: operating systems, applications, payment processing systems, databases, human resource and financial...
Yes this post is about the #Brexit, but it's about your data more importantly! As a company that has a large customer and open source user community in the EU, I thought a quick note on some considerations following the Brexit vote were in order. This is not an opinion piece, as that ...
This is part one of a two-part series of posts about using some common server storage I/O benchmark tools and workload scripts. View part II here which includes the workload scripts and where to view sample results. There are various tools and workloads for server I/O benchmark testin...
Clouds are typically classified into four different topologies: private, public, community and hybrid clouds. Let’s focus on hybrid clouds: what are the use cases that require this topology, what are the challenges, and who stands to benefit from the hybrid cloud trend? First off, a d...
Tangerine Bank in Toronto has improved end-user experiences for online banking and made data more secure across its lifecycle, speeding the delivery of a new credit card offering. We'll now learn how improving end-user experiences for online banking and making data more secure across ...
It seems like every day we see reminders of the importance of thorough security testing from all areas of the software world. Security has become an especially critical consideration for APIs in recent years. Organizations rely on APIs to share and receive information - either from a t...
A data breach could happen to anyone. Data managed by your company is valuable to someone, no matter what the data is. Everything has a price tag on the dark web. It is especially true when it is customer data, such as personal and payment card details. When your customers’ data turns...
It feels like the barbarians are continually at the gate. We can’t seem to go more than a week before a new data breach is in the news, impacting potentially millions of individuals. The targets range from companies like Omni Hotels, which had been breached affecting up to 50,000 custo...
While on a call with a customer last week, I was faced with the question of why the customer’s site had slowed down, even after they had switched to full SSL. Well, to be honest, it’s pretty obvious; SSL is more expensive from a web performance perspective. However, it wasn’t until I ...
Are you still pondering whether to integrate cloud computing services into the structure of your IT network? You are not the only one. Most IT professionals are very concerned about data security, so they aren’t that willing to switch to cloud computing solutions that easily. It’s a fa...
Cloud computing has taken over the business world! With almost maniacal focus, single proprietors and Board Directors of the world's largest conglomerates see this new model as a "must do". This rapid shift is, in fact, accelerating. As Jeff Bertolucci observes in "The Shift to Cloud S...
Opining about the future of AI at the recent Brilliant Minds event at Symposium Stockholm, Google Executive Chairman Eric Schmidt rejected warnings from Elon Musk and Stephen Hawking about the dangers of AI, saying, “In the case of Stephen Hawking, although a brilliant man, he’s not a ...
The next BriefingsDirect security market transformation discussion explores how airline Allegiant Air solved its payment card industry (PCI) problem -- and got a whole lot better security culture to boot. When Allegiant needed to quickly manage its compliance around the Payment Card I...
Distributed Denial-of-Service (DDoS) attacks have become the primary threat to the availability of networks and online services and the peak attack sizes have grown by a factor of more than 50 over the last 10 years. Today, botnets and easy-to-use tools for launching DDoS attacks have ...