by Christine Thome | Nov 14, 2018 | Security
Originally published in the CrowdStrike Blog, by Harlan Carvey, November 7, 2018 Dealing with an active, dedicated adversary during an incident is very different than what many consider the more “traditional” incident response process of finding and removing malware....
by Christine Thome | Nov 14, 2018 | Networking
Originally published on the Aruba Networks Blog, by Patrick LaPorte, November 13, 2018 Over the last decade, mobile has fueled unprecedented innovation. The economy is booming, and productivity has reached new heights. But the reality is that technology we use every...
by Christine Thome | Nov 14, 2018 | Storage
Originally published on the Western Digital Blog, by Kurt Esser, November 7, 2018 Understanding how your data is being accessed can help you optimize your storage environment, free critical resources, and save you money. Here’s how you can harness intelligent data...
by Christine Thome | Oct 16, 2018 | Storage
Originally published on StorageNewsletter.com on October 12, 2018 Violin Systems LLC announced an addition to performance storage platform family, the XVS 8, which delivers performance with low latency and enterprise data services, enabling customers to accelerate...
by Christine Thome | Oct 16, 2018 | Networking, Security
Originally published on Aruba Networks’ blog, April 30, 2018, by Partha Narasimhan Robert Frost is one of my favorite poets. As he begins, “Two roads diverged in a yellow wood…”. It’s a line that reminds me where you and other IT leaders...
by Christine Thome | Oct 16, 2018 | Security
Business leaders face what could arguably be the greatest threat in the history of modern commerce: catastrophic cybersecurity breaches that cost $600 billion a year globally. As “digital” becomes synonymous with business and our personal lives, the attacks show...
by Paul Comfort | Oct 15, 2018 | Storage, Virtualization
Last month we started talking about SANs and why they make sense in an enterprise environment. This month I am going to discuss a SAN feature called Thin Provisioning. As before, this article will simplify some concepts in order to be relevant to more people. If you...
by Christine Thome | Sep 14, 2018 | Uncategorized
Originally published on the Extreme Network blog, August 15, 2018, by Kendra Luciano An explosion of “things” is coming to a network near you – wearables, temperature sensors, video cameras, BLE, Thread, iBeacons, surveillance, gateways, building controls, and much...
by Christine Thome | Sep 14, 2018 | Uncategorized
Originally published on the Barracuda Blog, August 30, 2018, by Asaf Cidon Microsoft Office 365 has become so ubiquitous—with more than 100 million monthly active subscribers—that it’s almost become part of our identities particularly inside the network with emails...
by Christine Thome | Sep 14, 2018 | Uncategorized
Originally published on the Quest blog, August 27, 2018, by Bennet Klein Many people think developing a disaster recovery plan is all about calamitous events such as fires and earthquakes, where physical property is damaged and people’s lives are at risk. But...