Signature Update #2547
  • Published in

Signature Update #2547 129 new signatures:HIGHHTTP: Blackhole Exploit Kit Landing Page RequestedHIGHHTTP: Bleeding Life Exploit Kit Module Call 11HIGHHTTP: Bleeding Life Exploit Kit Module Call 10HIGHHTTP: Bleeding Life Exploit Kit Module Call 9HIGHHTTP: Bleeding...

Read More
SRX and LN series platforms complete Common Criteria Certification and are listed on the NIAP Product Compliant List
  • Published in

SRX and LN series platforms complete Common Criteria Certification and are listed on the NIAP Product Compliant List    Juniper Networks SRX and LN series platforms complete Common Criteria Certification and are listed on the NIAP Product Compliant List as...

Read More
Signature Update #2546
  • Published in

Signature Update #2546 181 new signatures:HIGHHTTP: Eleanore Exploit Kit Exploit Fetch RequestHIGHHTTP: Eleanore Exploit Kit PDF Exploit Page RequestHIGHHTTP: Eleanore Exploit Kit Post-exploit Page RequestHIGHHTTP: Crimepack Exploit Kit Control Panel AccessHIGHHTTP:...

Read More
FireEye Myth and Reality
  • Published in

Some tech companies are always associated with their first acts. Dell just acquired my first employer, EMC Corporation, in order to expand its enterprise portfolio, yet the company will always be linked with personal computers and its founder’s dorm room. F5 has become a nexus that brings...

Read More
Did Dell and EMC Just Simplify the Enterprise Mobility Strategic Decision Making Process?

The fact that major IT vendors are consolidating isn’t a surprise, given the feedback we hear...

Read More
Pentahos Three-Legged Race to Big Data (with HDS)

Pentaho World 2015 was held in sunny Orlando this year, with over 500 attendees, and was by all...

Read More
Amazon Workspaces Delivery Compelling Usage Scenarios

I use Amazon Workspaces on my iPad Mini and have been impressed with its usability. While I admit...

Read More
Hybrid Clouds and Cybersecurity Front and Center at AWS re:Invent

The contrast of the DJ music pumping out bass lines and drum beats over hits from the 70s was quite...

Read More
Is Public Cloud in Dells Cards Post EMC Acquisition?

With the tech world all abuzz about the blockbuster Dell buyout of EMC, a few thoughts on what the...

Read More
The Haystack Problem

Organizations lack sufficient collect and compute resources to arrive at accurate conclusions about...

Read More
Run DeMC: Dell & EMC merge to thrive in the cloud era

Dell recently announced its intent to acquire EMC at approximately $33.15 a share, for a total...

Read More
Automated Traffic Visibility for Software Defined Data Centers using VMware NSX Dynamic Service Insertion

Another week, another advancement in GigaSECURE Security Delivery Platform from Gigamon, the leader...

Read More

Videos

Mat Brown, Senior Technical Marketing Engineer | Sustainability: Data Center & Hybrid Multicloud at Nutanix, who worked closely with Atlantic Ventures, as they produced the ‘Improving Sustainability in Data...
Iju Raj, Executive Vice President R&D and Simon Bennett, Director, Research and Innovation, both at AVEVA, discuss the importance of real time data analytics and how AI can help unlock access to this key...
Andy Venables, Chief Technology Officer & Co-Founder of POPX, discusses some of the challenges facing MSPs today, including providing a modern or digital service desk experience, managing service delivery in...
Yuval Bachar, co-founder and CEO of ECL, the data centre-as-a-service pioneer which unveiled a world first off-grid, sustainable, modular, built-to-suit data centre earlier this year, explains the thinking...

News

Panduit partners with Hyperview to replace its SmartZone Cloud software product offerings with Hyperview’s cloud-based DCIM platform.
ICS Cool Energy has delivered a comfort and process temperature control solution for a major hospital in Birmingham.
2025 will see UK businesses undertake a major shake up of their IT and data practices, new research shows.
New data reveals that outdated backup technology, limited backup data encryption, and failed data backups are top vulnerabilities to attacks.