Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.
Archives for June 2018
Automation critical to scalable network security
Securing the business network has been and continues to be one of the top initiatives for engineers. Suffering a breach can have catastrophic consequences to a business, including lawsuits, fines, and brand damage from which some companies never recover. To combat this, security professionals have deployed a number of security tools, including next-generation firewalls (NGFW) […]
What the Evolving Icebox Says About the Role for IT
IT is no longer just about keeping the lights on. These days organizations are relying on IT to help deliver a competitive edge through digitization.
Power a Multicloud World – Enabling Next-Generation Hybrid Cloud with Google Cloud
The pressure to innovate has never been greater to compete in a rapidly evolving marketplace. Hybrid cloud offers one of the biggest IT transformations of our generation. More RSS Feed: newsroom.cisco.com/rss-feeds …
Performing a SpotCheck Inspection with Stratusphere UX
The ability to meet expectations and deliver the appropriate user-experience on shared infrastructure platforms such as VMware View and Citrix XenApp and XenDesktop can be a complex and a challenging endeavor. One of the ways you can stay ahead of the curve is through a point-in-time analysis called the SpotCheck. Liquidware engineers and our partner […]
Why AI is So Brilliant and So Stupid
For all of the promise that artificial intelligence represents, a successful AI initiative still requires all of the right pieces to come together.
Supermicro is the latest hardware vendor with a security issue
Security researchers with Eclypsium, a firm created by two former Intel executives that specializes in rooting out vulnerabilities in server firmware, have uncovered vulnerabilities affecting the firmware of Supermicro servers. Fortunately, it’s not easily exploited. The good news is these vulnerabilities can be exploited only via malicious software already running on a system. So, the […]
How AI Can Combat Labor Displacement
Artificial intelligence just might be as much a prevention or cure for job loss as a cause.
1 + 1 = 3 : HPE + Veeam = Better Together
Bill Philbin, Global CTO Hybrid IT, Hewlett Packard Enterprise, presents at VeeamON 2018 and discusses the importance of hyper-availability services and how HPE and Veeam partner to provide these services for customers. Learn more about HPE and Veeam – https://www.veeam.com/hpe-availability-solution.html This video is from the fine folks at Veeam.
Are Biometrics Good or Bad for Digital Security?
Good arguments can be made for use of biometrics in security, but the technology does have is flaws.