Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago.
Cisco CEO trumpets Catalyst 9K advances, software business success
Industry bellwether Cisco revealed some important financial numbers this week – its revenues were $12.5 billion, up 4 percent for the third quarter year-over-year, with product revenue up 5 percent. But one of the of the more interesting tidbits is that the company said it was selling some 40 Catalyst 9000 systems a day in […]
AWS finds a partner to push blockchain tech
News 17 May, 2018 Bobby Hellard AWS and Consensys join forces to provide cloud-based enterprise blockchain templates
Kaspersky to relocate infrastructure to Switzerland for transparency
News 16 May, 2018 Bobby Hellard Cyber security company is relocating some of its operations after Russian hacking allegations
What an Apple phishing attack looks like | Salted Hash Ep 32
How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.
Citrix quietly ditches Xen and NetScaler brands days after Synergy 2018
News 16 May, 2018 Keumars Afifi-Sabet Existing brands snuffed days after new products were announced at its annual conference
Meet Google One, the cloud giant’s new paid storage tier
News 16 May, 2018 Clare Hopping The cloud service will be cheaper than current plans and will offer a whole lot more
Get a hands-on, inside look at the dark web | Salted Hash Ep 25
Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.
Can AI help bridge the IT security skills gap? | Salted Hash Ep 27
Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelligence systems.
The Enterprise of Thing’s troubling lack of security
When it comes to security and manageability, Enterprise of Things (EoT) devices must have far more stringent requirements than consumer IoT devices, which often have virtually no built-in security. Indeed, enterprise use of consumer-grade IoT is highly risky. Making the matter even more urgent is the growing number of deployed EoT devices, which is expected […]