With the Internet of Things (IoT), Software Defined Networking (SDN) and open source software gaining traction, security is even more of a concern to private and professional networks in today’s technological landscape. The frequent reports of information theft and...
Last month, Charlie Miller and Chris Valasek, two well-known network researchers from Pennsylvania, made headlines around the internet after they used a laptop to remotely hack into and take control of a Chrysler Jeep Cherokee. But even though Chrysler has already...
Network security is a primary concern for organisations in today’s marketplace. With many businesses operating across borders, and the ubiquity of Bring Your Own Device (BYOD) culture in offices around the world, the potential for security breaches is massive. Like...
Provisioning for the future isn’t a foreign concept to those in the IT industry. But in a marketplace whose primary feature is rapid change, it’s often difficult to be able to predict with any certainty what the future will bring. Information technology is at the...
Enterprise administrators are drowning in volumes of data logs generated from vast amounts of routers, switches, firewalls and other devices. This constant bombardment of information can cause relevant data to go undetected, leading to missed opportunities to identify...
The latest Sony Pictures hacking scandal holds some serious lessons for both company execs and CIO’s. When breaches in network security of this magnitude occur, there are usually severe outcomes for employees and senior staff across the ranks. Recent developments...
Recent Comments