Top

Software

Using Tetration for Application Security and Policy Enforcement

January 11, 2019

Via: Cisco Blog

Protecting assets within the enterprise requires the network manager to adopt automated methods of implementing policy on endpoints. A defense in depth approach, applying a consistent policy to the traditional firewall as well as policy enforcement on the host, takes […]


Analysis, Monitoring&Analysis

Tired of the 5G hype? Focus on 6G

January 11, 2019

Via: RCR Wireless News

If you’re in the telecoms world, you likely hear something about 5G at least 100,000 times every day. But, as with anything technology-related, you’ve got to keep on looking at what’s next. And if 5G is on the bubble, it […]


Analysis, Monitoring&Analysis

TEOCO Predicts Smart Cities, SD-WAN, IoT and eSports to Pick up Pace in 2019

January 11, 2019

Via: The Fast Mode

From smart cities, to SD-WAN, IoT and eSports, the industry is ready for operators to take plunge into these technologies and access their full value. In fact, one of the next big opportunities will be smart building management in smart […]


Monitoring&Analysis, Security

What is the dark web? How to access it and what you’ll find

January 11, 2019

Via: CSO

The dark web is a part of the internet that isn’t indexed by search engines. You’ve no doubt heard talk of the “dark web” as a hotbed of criminal activity — and it is. Researchers Daniel Moore and Thomas Rid […]


Monitoring&Analysis, Security

Six Things Enterprises Should Know About Securing Their DNS

January 10, 2019

Via: eWeek

It doesn’t normally get a lot of attention, but the DNS (Domain Name System) plays a critical role in the presence of an online business––website, online services, cloud connection and applications. When DNS fails, end users cannot find you online. […]


Monitoring&Analysis, Security

The cybersecurity skills shortage is getting worse

January 10, 2019

Via: CSO

At the end of each year, ESG conducts a wide-ranging global survey of IT professionals, asking them about challenges, purchasing plans, strategies, etc. As part of this survey, respondents were asked to identify areas where their organization has a problematic […]


Monitoring&Analysis, Security

How edge computing can help secure the IoT

January 10, 2019

Via: Networkworld Security

Data created by Internet of Things (IoT) sensors must be secured better, say some. A simple password-on-device solution is no longer sufficient thanks to increasing data protection regulations, a new public awareness of tracking, and hugely proliferating devices. A new […]


Analysis, Monitoring&Analysis

Edge computing best practices

January 10, 2019

Via: ITWorld Networking

Data processing, analytics, and storage increasingly are taking place at the network edge, close to where users and devices need access to the information. Not surprisingly, edge computing is becoming a key component of IT strategy at a growing number […]


Hardware, Monitoring&Analysis, Security

Discover Meraki APIs for Location Analytics, Cameras, and Network Health

January 9, 2019

Via: Cisco Blog

Meraki wireless networks and security cameras are deployed in large numbers of retail outlets, hotels, campuses, and enterprises. Meraki wireless networks connect many business-critical devices, including Point-of-Sales devices, and provide internet connectivity to visiting customers. The Meraki camera provides reliable […]


Monitoring&Analysis, Security, Software

Data Privacy Day 2019

January 9, 2019

Via: CSO

January 28 is Data Privacy Day! Thanks to Europe’s GDPR we are all thinking data privacy these days. GDPR is the general data protection regulation It is an EU law on data protection and privacy for all individuals within the […]