VARIEDY BASTION

Keep up to date on technology news, digital media trends....

We’re living in the golden age of software development

Software, as Marc Andreessen says, is eating the world. Everything we do is mediated through someone’s code — running on a smart thermostat, a smartphone, the old familiar PC, or as a microservice in an ever-expanding cloud. We’re finally delivering on the decades-old promise of a ubiquitous computing world. But more than that, from the […]

Why You Need a Web Application Firewall (WAF)

Hackers are getting control of web servers for different reasons, the main ones being the ability to control a server and spread malware.  Often, these two objectives go hand in hand. Why do hackers want to control a web server? Because a server is often hundreds of times more powerful than a workstation and that […]

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems. A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network […]

Serverless: The future of cloud computing?

Serverless: The future of cloud computing? While the cloud lends companies more agility, New York Times CTO Nick Rockwell says event-triggered computing cuts cost and enables more efficient application development. Welcome to the serverless era. Find out more by reading the article below… https://www.cio.com/article/3244644/cloud-computing/serverless-the-future-of-cloud-computing.html  

Is Cloud Storage Really Secure?

A reader asks: “Where does cloud storage really reside? And is it secure?” Quentin Hardy, The Times’s deputy technology editor, considers the question. _____ “Cloud” data is stored on hard drives (much the way data is usually stored). And yes, it’s probably more secure than conventionally stored data. What makes cloud storage different? Instead of being stored directly […]

Three critical steps to help maximize All-flash performance

All-flash storage infrastructures are famous for increasing performance.  As a matter of fact, 70% of enterprises choose AFAs for transformative IOPs and reduced application latency.1  However, not all flash solutions are created equally. Read more about how to maximize your all-flash performance here: https://kaminario.com/company/blog/three-critical-steps-to-maximize-all-flash-performance/

3 Reasons Why Flash Should Be Front and Center in Your Storage Strategy

The rapid rise of flash to the top of the storage agenda is not surprising, given the advances we’ve seen in this technology over the past few years. Performance has improved by leaps and bounds, and the price decline curve has been steep. Density has been climbing steadily, with 3.84 TB solid-state drives (SSDs) now […]

The New DDoS Landscape

News outlets and blogs will frequently compare DDoS attacks by the volume of traffic that a victim receives. Surely this makes some sense, right? The greater the volume of traffic a victim receives, the harder to mitigate an attack – right? At least, this is how things used to work. An attacker would gain capacity […]

Email Security that Meets Government Standards

Nation state actors, cyber criminals, hacktivists and other attackers continue to set their sights on government organizations. In 2017 alone, breaches were reported on the federal level at a major military branch, on the state level at a Division of Medicaid and Department of Motor Vehicles, and on the local level at a County Clerk’s […]

Email Security: A Buyer’s Guide

Today’s attackers seem to be using malicious emails more than anything else to infect their targets. Many of these sophisticated, malevolent messages trick users into clicking links, downloading attachments, sharing credentials or taking some action that activates ransomware, installs malware or gives cyber criminals access to business networks. Traditional signature-based and reputation-based defenses such as […]
Load More
Fail to load posts. Try to refresh page.