17.2 C
Johannesburg

Juniper set to reinforce edge, cloud technologies

There is a fundamental, but perhaps a logical evolution in the way networks are being built to handle hybrid cloud applications – resources are moving closer to the...

IDG Contributor Network: JEDI award signals a critical ‘perception of parity’ in the cloud...

AWS, Amazon’s cloud business, has enjoyed a long run as undisputed heavyweight champion of the cloud wars. With revenue run rate nearing 36 Billion and continuous double-digit market...

Is AWS Liable in Capital One Breach?

Senators penned a letter to the FTC urging it to investigate whether Amazon is to blame for the massive Capital One data breach disclosed earlier this year. Read more

Religious Website Data Exposed for Months

Potential follow-on attacks on religious organizations could include credit-card theft via spearphishing, fraud and network intrusion. Read more

Gartner: Top 10 strategic technology trends for 2020

ORLANDO – The pace of technology change is accelerating rapidly, augmented by factors that IT pros need to study-up on, things they never had to deal with before...

Cynet’s free vulnerability assessment offering helps organizations significantly increase their security

By monitoring their environment, companies can be ready to take action if any weakness – usually a software vulnerability – is found. Read more

Gartner: 10 infrastructure trends you need to know

ORLANDO – Corporate network infrastructure is only going to get more  involved  over the next two to three years as automation, network challenges and hybrid cloud become more...

AA19-290A: Microsoft Ending Support for Windows 7 and Windows Server 2008 R2

Original release date: October 17, 2019 | Last revised: October 18, 2019SummaryNote: This alert does not apply to federally certified voting systems running Windows 7. Microsoft will continue to...

Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS

The flaws in the container technology, CVE-2019-16276 and CVE-2019-11253, are simple to exploit. Read more

Docker Containers Riddled with Graboid Crypto-Worm

A worm with a randomized propagation method is spreading via the popular container technology. Read more

Latest article

Two men busted for hijacking victims’ phones and email accounts

Prosecutors allege that Meiggs and Harrington took over their targets' mobile phone and email accounts via SIM-swapping. Read more

Leaked Russian Interference Report Raises Questions About Brexit, UK Election Security

A report from the U.K. Parliament's intelligence committee concludes that "Russian interference may have had an impact on the Brexit referendum," reports the Times...

Lessons From the Cyberattack On India’s Largest Nuclear Power Plant

Dan Drollette shares an article by two staffers at the Center for Global Security Research at Lawrence Livermore National Laboratory from The Bulletin of...