Will open networking lock you in?

Will open networking lock you in?

There’s open, then there’s open.  At least that seems to be the case with network technology. Maybe it’s the popularity and impact of open-source software, or maybe it’s just that the word “open” makes you think of being wild, happy, and free—whatever it is, the concept of openness in networking is catching on. Which means, of course, that the definition is getting fuzzier every day. When I talk with enterprises, they seem to think that…

Read More

Samsung demos 512GB DDR5 memory aimed at supercomputing, AI workloads

Samsung demos 512GB DDR5 memory aimed at supercomputing, AI workloads

Samsung Electronics last month announced the creation of a 512GB DDR5 memory module, its first since the JEDEC consortium developed and released the DDR5 standard in July of last year. The new modules are double the max capacity of existing DDR4 and offer up to 7,200Mbps in data transfer rate, double that of conventional DDR4. The memory will be able to handle high-bandwidth workloads in applications such as supercomputing, artificial intelligence, machine learning, and data…

Read More

5 perspectives on modern data analytics

5 perspectives on modern data analytics

Some things don’t change, even during a pandemic. Consistent with previous years, in CIO’s 2021 State of the CIO survey, a plurality of the 1,062 IT leaders surveyed chose “data/business analytics” as the No.1 tech initiative expected to drive IT investment. Unfortunately, analytics initiatives seldom do nearly as well when it comes to stakeholder satisfaction. Last year, CIO contributor Mary K. Pratt offered an excellent analysis of why data analytics initiatives still fail, including poor-quality or…

Read More

Major League Baseball makes a run at network visibility

Major League Baseball makes a run at network visibility

Major League Baseball is taking network visibility to the next level. “There were no modern network-management systems in place before I came in. It was all artisanally handcrafted configurations,” says Jeremy Schulman, who joined MLB two years ago as principal network-automation software engineer. Legacy systems, including PRTG for SNMP-based monitoring and discrete management tools from network vendors, allowed MLB to collect data from switches and routers, for example, and track metrics such as bandwidth usage….

Read More

Over 90% of Organizations Hit by a Mobile Malware Attack in 2020

Over 90% of Organizations Hit by a Mobile Malware Attack in 2020

Almost every global organization suffered at least one mobile malware attack in 2020, according to a new report from Check Point. The security vendor polled 1800 customers of its Harmony Mobile device threat protection product to compile its 2021 Mobile Security Report. Of the near-total number that faced a mobile attack last year, 93% of incidents originated in a device network, and were either phishing attempts (52%), C&C communication with malware already on the device…

Read More

Man Arrested After Failed AWS Bomb Plot

Man Arrested After Failed AWS Bomb Plot

A Wichita Falls man has been charged after allegedly planning to blow up an Amazon Web Services (AWS) datacenter in Virginia. Seth Aaron Pendley, 28, was arrested last Thursday after procuring what he thought was an explosive device from an undercover FBI officer in Fort Worth. He was charged with a malicious attempt to destroy a building with an explosive, after a concerned individual flagged “alarming” statements he made on a militia group forum under…

Read More

The Gaylord Opryland Resort boosts security

The Gaylord Opryland Resort boosts security

The Gaylord Opryland Resort boosts security | 2021-04-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Timing isn’t everything but it helps

Timing isn’t everything but it helps

Timing isn’t everything but it helps | 2021-04-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls

How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls

Digital attackers are increasingly launching sophisticated campaigns in an effort to target U.S. federal agencies and other organizations. Two recent examples demonstrate this reality. These are the SolarWinds supply chain attack and the HAFNIUM Exchange exploit campaign. The SolarWinds Supply Chain Attack In mid-December 2020, the security community learned that an advanced persistent threat (APT) had targeted SolarWinds’ Orion network management software with a backdoor. Tripwire VERT warned that the those responsible for the attack…

Read More

More Power, More Responsibility

More Power, More Responsibility

What the Defense and Intelligence Communities Need to Know About 5G By Brian Green, Senior Vice President, Booz Allen Hamilton With the potential to revolutionize global telecommunications, fifth-generation mobile technology (5G) forges connections between physical devices and the digital world – creating new opportunities to share, compute, and act upon information with unprecedented speed and at an unheard-of scale. For the defense and intelligence communities, 5G opens myriad possibilities to address operational needs, enhance mission…

Read More
1 3,522 3,523 3,524 3,525 3,526 3,898