HPE announces Arm-based Ampere servers

HPE announces Arm-based Ampere servers

HP Enterprise says it will deliver a series of servers powered by the Arm-based Altra and Altra Max by Ampere, the CPU startup run by former Intel executive Renee James. Ampere, not to be confused with the GPU processor of the same name from Nvidia, has scored some wins with cloud providers, notably Microsoft Azure and Oracle Cloud Infrastructure, but it had yet to land in OEM partner. Until now. Starting in Q3 2022, HPE…

Read More

HPE announces Arm-based Ampere servers

HPE announces Arm-based Ampere servers

HP Enterprise says it will deliver a series of servers powered by the Arm-based Altra and Altra Max by Ampere, the CPU startup run by former Intel executive Renee James. Ampere, not to be confused with the GPU processor of the same name from Nvidia, has scored some wins with cloud providers, notably Microsoft Azure and Oracle Cloud Infrastructure, but it had yet to land in OEM partner. Until now. Starting in Q3 2022, HPE…

Read More

Why it makes sense for Broadcom to buy VMware

Why it makes sense for Broadcom to buy VMware

Why the heck would a hardware and chip company like Broadcom buy a software company like VMware? Wall Street and industry analysts haven’t exactly jumped with joy over the pending deal, after all. Companies sometimes do stupid things; that seems to be the consensus. But with this deal, that may not be the case at all.  Broadcom may be responding to the fundamental shifts in the industry, both in computing and in networking. The cloud…

Read More

British Army Social Media Accounts Hijacked

British Army Social Media Accounts Hijacked

The British army’s Twitter and YouTube accounts were compromised by a malicious third party on Sunday and used to direct visitors to cryptocurrency scams. The Ministry of Defence (MoD) press office account took to Twitter at around 7pm local time to report the incident. “We are aware of a breach of the army’s Twitter and YouTube accounts and an investigation is underway,” it said. “The army takes information security extremely seriously and is resolving the issue….

Read More

Why Security Configuration Management (SCM) Matters

Why Security Configuration Management (SCM) Matters

In the Godfather Part II, Michael Corleone says, “There are many things my father taught me here in this room. He taught me: keep your friends close, but your enemies closer.” This lesson Vito Corleone taught his son Michael is just as applicable to IT security configuration management (SCM). Faster breach detection Today’s cyber threat landscape is extremely challenging. This is highlighted by the length of time it takes to detect a breach. The gap…

Read More

Feeling Beleaguered? 3 Practical Steps for Cybersecurity Mastery

Feeling Beleaguered? 3 Practical Steps for Cybersecurity Mastery

By Tim Liu, Co-Founder & CTO, Hillstone Networks Cybersecurity may seem an unending challenge, with new vulnerabilities, attacks and breaches announced almost daily. With all the loud headlines, and the potentially large financial and professional impacts of a breach or other attack, it’s easy for CISOs to feel a bit beleaguered. Ransomware, for example, doubled in 2021 according to Verizon’s 2021 Data Breach Investigations Report.  Most industries have come under attack, including education, retail, government,…

Read More

ICO Set to Scale Back Public Sector Fines

ICO Set to Scale Back Public Sector Fines

The UK’s new data protection regulator has signaled a fresh approach to public sector enforcement which will see his office likely levy fewer financial penalties and lower sums. Information commissioner, John Edwards, said last week that such fines ultimately end up negatively impacting public services. “I am not convinced large fines on their own are as effective a deterrent within the public sector. They do not impact shareholders or individual directors in the same way as…

Read More

HackerOne Insider Defrauded Customers

HackerOne Insider Defrauded Customers

A former employee at HackerOne used their access to sensitive information at the bug bounty platform to generate personal profits, the firm has revealed. The unnamed individual’s system access was terminated just 24 hours after a tip off from a customer revealed they had “improperly accessed information in clear violation of our values, our culture, our policies, and our employment contracts.” The firm analyzed internal logs and found that the then-employee, who had access to…

Read More

How Cairn Oil & Gas is using IT to overcome one business challenge after another

How Cairn Oil & Gas is using IT to overcome one business challenge after another

Cairn Oil & Gas is a major oil and gas exploration and production company in India. It currently contributes 25% to India’s domestic crude production (about 28.4 MMT) and is aiming to account for 50% of the total output. The company plans to spend ₹3,16,09 crores (₹31.6 billion) over the next three years to boost its production. The oil and gas industry currently confronts three major challenges: huge price fluctuation with volatile commodity prices, capital-intensive processes…

Read More

The Need of Privacy Certifications for Lawyers | The State of Security

The Need of Privacy Certifications for Lawyers | The State of Security

The widespread adaptability and integration of tools and the professionals who can effectively use them to comply with the law will significantly impact the careers of both lawyers and other legal personnel. One of the fastest-growing areas in the legal profession in the United States is Privacy Law. Privacy certifications endorse attorneys as credentialed privacy lawyers. Privacy certifications can boost income streams and growth potential while increasing job stability and sustainability. In addition, privacy certifications…

Read More
1 2,861 2,862 2,863 2,864 2,865 4,068