Intel teams with hardware vendors for high-performance network card

Intel teams with hardware vendors for high-performance network card

Intel announced a collaboration with Inspur, Ruijie Networks, and Silicom Connectivity Solutions to design and develop new infrastructure processing units (IPU) using both a CPU and FPGA. IPU–what Intel calls a data-processing unit (DPU)–is a programmable networking device designed to offload network processing tasks such as storage virtualization, network virtualization, and security from the CPU. That reduces overhead and frees up the CPU to focus on its primary data-processing functions. They are becoming a real…

Read More

The latest tape storage is faster and holds more, but is it better?

The latest tape storage is faster and holds more, but is it better?

Magnetic storage tape has’t been the recommended destination for the initial backup copy of data for quite some time, and the question is whether LTO-9, the latest tape open standard, and other market dynamics will changed that. Here’s a look at modern tape drives, discussion of the degree to which ransomware changes the equation, and a closer look at LTO-9. Tape drives: Too fast for their own good? In the 80s and early 90s, there…

Read More

Looking at Linux disk usage with the ncdu command

Looking at Linux disk usage with the ncdu command

The ncdu command provides a useful and convenient way to view disk usage. The name stands for “NCurses disk usage”. This means that it’s based on ncurses which, like curses, is a terminal control library used on Unix/Linux systems. The curses part of each name is a pun on “cursor” or “cursor optimization” and is unrelated to the use of foul language. You can think of ncdu as a disk usage analyzer with an ncurses…

Read More

Learn how APIClarity allows you to monitor the API calls within and outside your application service.

Learn how APIClarity allows you to monitor the API calls within and outside your application service.

Where we came from Over the last decade we have been moving to Cloud Native deployments for most of our application and API deployment. This has mostly been an effort to break legacy monolithic application and service models into what we commonly refer to as microservices. Most of that move has been most successful under Cloud Native technologies utilizing containers and container orchestration. This move has been handled utilizing Kubernetes, Docker, and other similar technologies….

Read More

Anomali Threat Research: Apache Log4j 2 Vulnerability

Anomali Threat Research: Apache Log4j 2 Vulnerability

A critical vulnerability, registered as CVE-2021-44228 (Log4Shell), has been identified in Apache Log4j 2, which is an open source Java package used to enable logging in.[1] The vulnerability was discovered by Chen Zhaojun of Alibaba in late November 2021, reported to Apache, and subsequently released to the public on December 10, 2021.[2] The Apache Software Foundation (ASF) rates CVE-2021-44228 as a 10 on the common vulnerability scoring system (CVSS) scale.[3] Log4Shell is a remote code…

Read More

CSAM Found on LSU Professor’s Computer

CSAM Found on LSU Professor’s Computer

Police have arrested a professor at a Louisiana university after child sexual abuse material was discovered on his office desktop computer.  An investigation was begun in East Baton Rouge on Thursday after officials at Louisiana State University’s (LSU’s) Agricultural Center (AgCenter) were contacted by concerned employees in the center’s IT department.  The IT workers raised the alarm after discovering files with “names that alarmed them” on the hard drive of a work computer used by sixty-one-year-old cotton…

Read More

How Cisco IT is solving multi-cloud management: a single pane of glass – Cisco Blogs

How Cisco IT is solving multi-cloud management: a single pane of glass – Cisco Blogs

In collaboration with Kenny Jones, Mayank Jain, Earl Dimaculangan   Management of multi-cloud matures Figure 1. Multi-cloud strategy adoption For enterprise IT organizations, the public cloud has become a staple at delivering software, infrastructure, security, and other capabilities at scale. Companies primarily adopt public cloud services for greater flexibility, faster time-to-market, and to take advantage of best-of-breed solutions while avoiding vendor lock-in. While SaaS platforms are the lion’s share of services consumed (48%), IaaS and…

Read More

SANS Opens Free Holiday Hack Challenge

SANS Opens Free Holiday Hack Challenge

An American non-profit cybersecurity training and IT company is inviting cybersecurity fans everywhere to boost their skills by taking part in a free festive hacking competition.  Competitors participating in the SANS Institute’s 2021 Holiday Hack Challenge must battle cyber-villains including Jack Frost to help Santa Claus save the holiday season.  Over a series of online games ranging in difficulty level from beginner right up to serious expert, players must come to the aid of the white-bearded legend, his elven…

Read More

Q&A with Ralph Spencer Poore

Q&A with Ralph Spencer Poore

  After more than 10 years working at PCI Security Standards Council (PCI SSC), Ralph Poore, Director, Emerging Standards, retires at the end of the year. In this blog, we interview Ralph about his career in cryptography, security and the payments industry, the most rewarding aspects of his career, and how he plans to stay involved with the PCI SSC as well as his retirement plans.

Read More

Hackers Target India’s Prime Minister

Hackers Target India’s Prime Minister

The personal Twitter account of India’s prime minister, Narendra Modi, has been attacked by cyber-criminals. Hackers compromised the leader’s social media account in the early hours of December 11 to tweet a message to his more than 73 million followers. The brazen hackers posted a tweet falsely claiming that India would be adopting Bitcoin as its official currency. The lies didn’t end there, as the threat actors went on to falsely state that the Indian government had bought 500…

Read More
1 3,398 3,399 3,400 3,401 3,402 4,352