How to secure containers and microservices

The cloud will never be less complex; a policy-driven approach to deployment and management delivers security and trust

02/04/16

Protect yourself against DNS tunneling

A ubiquitous and often unprotected networking protocol, DNS makes a tempting target for hackers

01/28/16

What every CISO should know about machine learning

Machine learning allows security to adapt to the network being monitored, thereby improving threat detection and reducing false positives

01/21/16

SSDs gear up for five-fold speed boost

A host interface developed specifically for solid-state storage, NVMe is about to break the SATA bottleneck

01/14/16

Endpoint modeling: A new look at IT security

Today's realities such as end-to-end encryption, device proliferation, and increasing attacker sophistication call for a new approach to securing our networks

01/05/16

Get started with log-driven development

Development and test cycles are becoming quicker and more efficient, so organizations need to use log-driven development for stricter monitoring

01/04/16

In search of a cure for slow mobile downloads

Why the mobile Web is slow and how developers of native mobile apps can eliminate the wait

12/22/15

Data virtualization: The missing link in the devops tool chain

How copy data virtualization can help streamline development and testing, while also reducing storage costs

12/15/15

Machine learning: A practical introduction

How new tools and techniques are extracting business insights from massive data sets

12/08/15

MongoDB and Redis pair volume with velocity

For new kinds of high-capacity, real-time applications, two databases are better than one

12/01/15

5 tips for using public Wi-Fi securely

Wi-Fi hotspots are wonderfully convenient, even for hackers; follow these tips to stay safe

11/24/15

Web scale vs. hyperconverged: Understand the differences

Why Web-scale architectures are not hyperconverged, and hyperconverged architectures are not Web-scale

11/17/15

Deep learning: A brief guide for practical problem solvers

When prediction is the goal, deep learning is faster and more efficient than other machine learning techniques

11/10/15

Low-code development meets fine-grained security

Low-code development meets fine-grained security

With rapid application development platforms like Intuit QuickBase, role-based access controls are just a few clicks away

11/03/15

5 bitter truths about software-defined storage

Software-defined storage can deliver great agility and cost savings -- if you watch for these caveats

10/27/15

Strengthen your network security with Passive DNS

Collecting and analyzing Passive DNS data can help identify malicious sites and combat phishing and malware; here’s how to get started

10/20/15

A better approach to cloud encryption

Many cloud encryption solutions weaken security to preserve functionality; it doesn't have to be like that

10/13/15

Where to start with containers and microservices

Lessons from Java and VMs show enterprise operations pros the way to microservices adoption

10/06/15

Why traditional storage QoS methods aren’t good enough

Only a flash array can deliver guaranteed, predictable storage performance -- and only if it was designed to do so

09/29/15

Take agile methodology beyond the team

A quick guide to scaling an agile software delivery lifecycle across your organization

09/22/15

Load More