• img July 12, 2017

Constant availability: Mission-critical business data challenges

In today’s world, consumers expect businesses to be always-on, but 24/7/365 availability – for both data and applications – comes with specific information security challenges. “The most significant challenges often exist in both ensuring and providing attestation of data protection for customers” personal information,” says Danny Allan, VP, Cloud & Alliance Strategy at Veeam Software. […]

Read More
  • img July 12, 2017

What will it take to improve the ICS patch process?

While regular patching is indisputably good advice for IT networks, one of the main takeaways from the Petya and WannaCry attacks is that a lot of companies don’t do it. And with even more NSA exploits like EternalBlue scheduled to be released by The Shadow Brokers (TSB), it’s certainly not going to get any better. […]

Read More
  • img July 12, 2017

Event-driven architecture to become essential skill

Achieving broad competence in event-driven IT will be a top three priority for the majority of global enterprise CIOs by 2020, according to Gartner. Defining an event-centric digital business strategy will be key to delivering on the growth agenda that many CEOs see as their highest business priority. “Event-driven architecture (EDA) is a key technology […]

Read More
  • img July 12, 2017

NotPetya — 'Ransomware' That Spreads like a Worm

Barely out of the woods with WannaCry, another global ransomware attack, a new variant of ‘Petya,’ began infecting organizations throughout Europe and into the Americas. Upon initial analysis and investigation, the attack was thought to be a variant of Petya ransomware, as the the threat actors behind the attack carefully designed it to look the […]

Read More
  • img July 12, 2017

NotPetya — 'Ransomware' That Spreads like a Worm

Barely out of the woods with WannaCry, another global ransomware attack, a new variant of ‘Petya,’ began infecting organizations throughout Europe and into the Americas. Upon initial analysis and investigation, the attack was thought to be a variant of Petya ransomware, as the the threat actors behind the attack carefully designed it to look the […]

Read More