The many faces of awk

The many faces of awk

If you only use awk when you need to select specific fields from lines of text, you might be missing out on a lot of other services that the command can provide. In this post, we’ll look at this simple use along with many other things that awk can do for you with enough examples to show you that the command is a lot more flexible than you might have imagined. Plucking out columns of data The easiest and…

Read More

Black Hat USA 2021 and DEF CON 29: What to expect from the security events

Black Hat USA 2021 and DEF CON 29: What to expect from the security events

Key topics analysts anticipate for these security conferences include supply chain attacks, Microsoft Exchange vulnerabilities and the iPhone/Pegasus spyware incident. Image: iStockphoto/nicescene Following a string of major cyberattacks and proposed initiatives by the U.S. government to better thwart them, cybersecurity has never been so uppermost on the minds of organizations and individuals around the world. That’s why this week’s Black Hat and DEF CON conferences promise to run hot and heavy with a host of…

Read More

Part One: Conceptual Differences Between SSF and PA-DSS

Part One: Conceptual Differences Between SSF and PA-DSS

To assist stakeholders in their migration from PA-DSS to the Software Security Framework, PCI Security Standards Council (PCI SSC) is publishing a series of blog posts to guide payment software vendors and assessors through the key differences between PA-DSS and the SSF. In Part One of our multi-part blog series, PCI SSC’s Sr. Manager, Public Relations Alicia Malone sits down with PCI SSC’s Sr. Manager, Emerging Standards Jake Marcinko to discuss some of the conceptual…

Read More

Arista Networks, Inc. Reports Second Quarter 2021 Financial Results

Arista Networks, Inc. Reports Second Quarter 2021 Financial Results

SANTA CLARA, Calif.–(BUSINESS WIRE)– Arista Networks, Inc. (NYSE: ANET), an industry leader in cognitive cloud networking solutions for large datacenter and campus environments, today announced financial results for its second quarter ended June 30, 2021. Second Quarter Financial Highlights Revenue of $707.3 million, an increase of 6.0% compared to the first quarter of 2021, and an increase of 30.8% from the second quarter of 2020. GAAP gross margin of 64.2%, compared to GAAP gross margin…

Read More

How to Accelerate SecOps efficiency and extend capabilities with XDR

How to Accelerate SecOps efficiency and extend capabilities with XDR

By Ed Martin, Director of Product Management, Secureworks Security Operations (SecOps) teams have been under pressure since their inception to perform the role of enterprise defender for firms in every industry. From detecting inbound attacks to managing prevention technologies, to becoming experts in all forms of threat intelligence, these teams have required continuously upskilling, just to keep up with attackers’ tactics, techniques, and procedures. These challenges combined with the prevailing need for businesses to look…

Read More

Taking Zero Trust to the Edge

Taking Zero Trust to the Edge

No one can deny that networks have changed. With the rise in remote working and multi-cloud adoption, the traditional idea of the enterprise perimeter has changed. The move to cloud and hybrid networks made traditional leased line networks used for routing traffic back to data centers less relevant. Now networks are distributed and complex with more edges. Instead of a data center as a hub of the network, now software-defined wide area networks (SD-WAN) are…

Read More

Taking Back Control of Today’s Software Supply Chain

Taking Back Control of Today’s Software Supply Chain

By Jasmine Noel,  Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches will continue to succeed until security teams abandon common myths and misconceptions around these risks in favor of a more holistic fact-based approach. While this threat has existed for a long time, the focus on supply chain attacks has grown in intensity just recently. It started late last year with the SolarWinds SunBurst attack and was followed…

Read More

Multi-Cloud Use – Data Center Modernization should be a key part of your multi-cloud strategy

Multi-Cloud Use – Data Center Modernization should be a key part of your multi-cloud strategy

Welcome to part 4 in this series on multi-cloud use maturity.  A comprehensive eBook that includes the entire multi-cloud use maturity framework can be found here.  Today I want to focus on an area (data center modernization) that may be a bit counter intuitive given that this is a discussion centered on multi-cloud use. Hopefully, by the end of this blog you’ll see why data center modernization should be a critical part of most organization’s…

Read More

No, You Don’t Need

No, You Don’t Need

By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To underscore that point, the market was valued at $1.81 billion in 2020, according to Mordor Intelligence, and looks to increase to $6.9 billion by 2026 for a CAGR of 25.6% over the next five years. This is huge as more companies start to look into…

Read More
1 3,604 3,605 3,606 3,607 3,608 4,236