Analyses

earthlink sd wan
exit sign

CSO slideshow - Insider Security Breaches - Flag of China, binary code

MongoDB’s new license won’t solve its China problem

We need to find ways to ensure commercial open source can thrive, without worrying about the big cloud providers sucking out all value without contributing back

Broken window with band-aid patch

Lab rats, Windows 10 and the importance of being last

The file-deletion flaw that plagued last week's rollout of the Windows 10 October 2018 Update shows how Microsoft uses consumers to test out the OS so its important customers – businesses – are protected.

head in clouds magrite headless suit derby hat unknown

The cloud in 2019: Multicloud, serverless computing, and Kubernetes containers

Enterprises are quickly moving up the cloud stack, away from infrastructure services

20170302 ericsson connected iot screwdriver at mwc 2017

Edge computing is the place to address a host of IoT security concerns

Edge computing offers a great deal of promise in addressing Industrial Internet of Things (IIoT) security concerns, but it isn't a drop-in solution to such problems.

ransomware wannacry

What is WannaCry ransomware, how does it infect, and who was responsible?

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

abstract digital network mapping

DHCP defined and how it works

Dynamic host configuration protocol simplifies and improves the accuracy of IP addressing but can raise security concerns

data code numbers

What is data deduplication, and how is it implemented?

By eliminating redundant blocks of data within a dataset – deduplication – enterprises can reduce the size of backups 90-99%.

ip dhcp network internet

Why DHCP's days might be numbered

Dynamic host configuration protocol (DHCP) still assigns dynamic addresses for IPv4 networks, but two newer protocols – SLAAC and DHCPv6 – are vying to do the job for IPv6.

security bug

Software security: There’s more to it than bug-bounty programs

Take full advantage of white-hat hackers to help you secure your code. And still do all the other security stuff you should do before you release your code

intro healthcare technologies for ma

8 technologies driving health care M&As

Forty-eight percent of respondents to a West Monroe survey cited using technology to disrupt incumbents as one of their top drivers for making health care acquisitions. Here’s a look at what they’re buying.

Load More