Enterprise Infrastructure VPN: Which Solution Is Best?

Enterprise Infrastructure VPN: Which Solution Is Best?

As cybersecurity risks intensify, having a reliable, resilient and secure private network has never been more important. To combat these risks and embrace more popular remote and hybrid ways of working, enterprise infrastructure VPNs have become increasingly popular. However, selecting the right solution is not easy, and there are many factors to consider when evaluating … Read more

The ‘Internet of Things’ can revolutionize the agricultural sector

The ‘Internet of Things’ can revolutionize the agricultural sector

Internet of Things (IoT) broadly means “All objects, which are connected to the web, will be able to share and process data through their sensors and communication devices independently”. It is estimated that by 2023, globally, there may be 7 billion connected people, more than 30 million applications and integrated systems, more than … Read more

AMD heats up DPU competition with Pensando acquisition

AMD heats up DPU competition with Pensando acquisition

AMD’s $1.9 billion acquisition of Pensando would put the chipmaker alongside Intel and Nvidia in competition for business from large enterprises deploying smartNICs as critical infrastructure for modernized data centers running private clouds. . This week, AMD revealed plans to acquire a Milpitas, Calif., maker of programmable package processors before July. Pensando technology competes … Read more

Rackspace and Akamai Partner to Bring Enterprise-Grade Application Security to Small and Medium Businesses

Rackspace and Akamai Partner to Bring Enterprise-Grade Application Security to Small and Medium Businesses

SAN ANTONIO, April 6, 2022 (GLOBE NEWSWIRE) — Rackspace Technology® RXTa leading end-to-end multi-cloud technology solutions company, today announced enhancements to its strategic partnership with Akamai Technologies, Inc. AKAMthe world’s most trusted solution for empowering and protecting digital experiences, to offer consulting services to global enterprises to help protect their applications and APIs. Through the … Read more

What Log4j can teach us about cloud security

What Log4j can teach us about cloud security

log4j is causing a logjam of concern among cybersecurity professionals, but it should also be a wake-up call to improve your organization’s overall cloud security posture. At this point, we’re all busy addressing threats that exploit vulnerabilities found in the Apache Log4j library, which is open source software used to communicate diagnostic messages to system … Read more

UAE signs new ICAO aviation cybersecurity collaboration agreement

UAE signs new ICAO aviation cybersecurity collaboration agreement

​ICAO Council President Salvatore Sciacchitano addressed the High-Level Conference on Cybersecurity in UAE Civil Aviation. The speech was among a variety of activities he undertook during a mission to Dubai last week. A new agreement signed by government officials from the United Arab Emirates (UAE) Ministry of Cabinet Affairs and the International Civil Aviation Organization … Read more

What is the role of incident response in ICS security?

What is the role of incident response in ICS security?

In recent years, cyber espionage has been growing in magnitude and complexity. One of the most common objectives are Industrial Control Systems (ICS) within critical infrastructure sectors. As many organizations rely more heavily on ICS networks, there has been an increase in cyber threats and attacks targeting these systems. These attacks not only have an … Read more