Conventional wisdom would have us believe that only large enterprises excel at cybersecurity. But small-to-medium-sized businesses can keep up with their bigger cousins — and with their agility and resourcefulness can even outperform in some areas, like aligning cybersecurity strategies with the business side. This was a key finding in Cisco’s 2021 SMB Security Outcomes Study. And last week an episode of CiscoChat Live! picked up the theme. In a session moderated by Hazel Burton, Cisco Secure Product […]
Archives for April 2021
What CIOs Need to Know About Graph Database Technology
Here’s a look at how graph database technology, together with AI, can help enterprises solve complex problems in an era of ever growing data. greenbutterfly via Adobe Stock The auto manufacturing supply chain is a complex web of suppliers, parts, specialized production lines, tools, and more. It’s not an easy task to create a sales […]
Red Hat launches OpenShift Platform Plus alongside new managed cloud services
Red Hat has launched an advanced tier of its OpenShift container application platform, with added tools designed to offer a complete Kubernetes stack out-of-the-box. This is in addition to launching three new managed cloud services. Red Hat’s OpenShift Kubernetes Engine is the foundational layer of OpenShift, allowing customers to run containers across hybrid cloud deployments on the Red Hat Enterprise […]
Google and Microsoft profits surge as cloud demand continues
Google and Microsoft reported surging profits on Tuesday as the two tech giants continued to capitalise on the COVID pandemic. Alphabet, Google’s parent company, posted first-quarter revenues of $55.31 billion, an increase of 34% year-on-year, and profits more than doubled to $17.93 billion, marking the third consecutive quarter of record profit for the company. Similarly, Microsoft reported that revenues increased by […]
Red Hat bolsters Edge strategy with major RHEL platform update
Red Hat has added a host of features to its flagship Red Hat Enterprise Linux (RHEL) platform to refine the product as a lightweight, production-grade operating system for edge computing. With RHEL 8.4, which will launch in the next few weeks, the company is adding Linux container deployment and management capabilities scaled for the intensive demands of edge computing. The […]
Backup failure: Four key areas where backups go wrong
Despite the prevalence of many forms of data protection – that range from local RAID via snapshots and replication to keeping copies in the cloud – the facts of life are that backup is still fundamental to IT. That’s because no matter what other methods you use – snapshots, replication, and so on – any […]
3 key areas of enterprise blockchain adoption in 2021
<!– –> Share this post: Many businesses are seeing the COVID-19 pandemic as a watershed for technology and innovation investment. Technology budgets have been reprioritised with a laser focus on near-term return on investment as a necessity for most. At the same time remote working, lockdowns and supply chain challenges have accelerated digital transformations that […]
Microsoft Teams suffers its second outage this month
Microsoft Teams has suffered a global outage for the second time this month that is preventing users from sending messages and logging in to the service. The tech giant confirmed the issue on Twitter and said it was currently investigating the root cause. The issue, which is throwing up a 401 error code, is preventing users from […]
Applying web application reconnaissance to offensive hacking
Securing web applications is a team sport. To stand a chance against a growing onslaught of web application attacks, software engineers and security practitioners need to know when to pass the ball. Integrating security expertise into software engineering is a key starting point. Web Application Security, published by O’Reilly Media, is a comprehensive resource for […]
Collaboration is key to a secure web application architecture
The number of web-based applications used by organizations large and small has significantly expanded in the digital transformation age. As a result, the attack surface area has also grown — and attackers have wasted no time targeting the personal, payment and proprietary data contained in these applications. In fact, 43% of breaches were linked to […]