“Your mission, Jim, should you decide to accept it, is…. As usual, should you or any member of your I.M. Force be captured or killed, the secretary will disavow any knowledge of your existence. This tape will self-destruct in five…
-
NordVPN: Health-Care Organizations Are Most Vulnerable to Cyber Threats
by Press Release September 26, 2017This summer, the U.S.-based pharmaceutical giant Merck has suffered the Petya ransomware attack that required to hand over a ransom or have its computers remain locked and inaccessible. One month before, the WannaCry ransomware attack devastated many big organizations around…
-
Make Data Center Monitoring Meaningful
by Leon Adato September 25, 2017There’s a data center monitoring and alert combination that I’ve seen in every single company I’ve worked with—as an employee, as a consultant and, heck, even when I was a guest on a tour through a data center operations…
-
Barracuda Confirms U.S. Companies Doubling Down on Public Cloud, Customers’ Security Responsibilities Still Unclear
by Press Release September 21, 2017Barracuda Networks, Inc. (NYSE: CUDA), a leading provider of cloud-enabled security and data protection solutions, has released findings from a new report, “Unlocking the Public Cloud — Benefits, Strategies, Challenges, and Solutions.” Conducted along with research firm Vanson Bourne, the study…
-
Industry Outlook: Data Center Networking Challenges
by Industry Outlook September 20, 2017Industry Outlook is a regular Data Center Journal Q&A series that presents expert views on market trends, technologies and other issues relevant to data centers and IT. This week, Industry Outlook asks Yaniv Kopelman, Networking CTO for the Networking Business Group at Marvell Semiconductor,…
-
The Changing Data Center Landscape: Four Things to Consider
by Mark Nichols September 19, 2017The traditional data center of yesteryear has been replaced with lean, mean virtual machines designed to keep pace with the insatiable demand for compute and storage resources. The environment has changed so dramatically that certain parts of the data center…
-
Evaluating End-Point Security
by Eli David September 18, 2017In recent years, evaluation in the end-point security domain has undergone rapid changes, particularly relating to detection rates. In most cases, measurement of detection rates relies on known malware that can be easily retrieved from public or private repositories. End-point…











