Cloud computing promised cost savings and simplified IT management, among other things. In many ways, the cloud has lived up to its ideals, and in other ways, such as API security, shadow IT and the securing of clouds across hybrid environments, the cloud has proven challenging. To get a sense of how enterprises and security […]
0 CommentsStudy finds a significant impact of ineffective bot resiliency, uncontrolled shadow IT, and scripted bots Mountain View, Calif., February 12, 2020 — Tricentis, the leader in enterprise automation, today released a new RPA research study conducted by Forrester Consulting and commissioned by Tricentis: Barriers and Best Practices for Scaling RPA. To explore what Robotic Process […]
0 CommentsNew funding will expand operations and allow for further research and development to address security challenges aimed at MSP and reseller channel ELLICOTT CITY, Md., Feb. 18, 2020 (GLOBE NEWSWIRE) — Huntress, a SaaS-based managed detection and response (MDR) provider for managed service providers (MSPs) and value-added resellers (VARs), today announced an $18 million Series A […]
0 CommentsDell Technologies today set its sights on becoming a major edge computing player with the launch of a Dell EMC PowerEdge XE2420 server optimized for space-constrained environments and a smaller version of a pre-integrated Dell EMC Modular Data Center Micro 415 (MDC Micro) ruggedized platform. In addition, Dell launched the Dell EMC Streaming Data Platform, […]
0 CommentsVeeam today announced the general availability of version 10 of the Veeam Availability Suite, which, among more than 150 enhancements, adds support for network-attached storage (NAS) systems, additional ransomware protection via an ability to create immutable backups in the cloud, an ability to recover multiple virtual machines simultaneously and a set of application programming interfaces […]
0 CommentsI have been watching the real-time regional situation reports about the coronavirus from the Chinese medical association site ncov.dxy.cn (the same site the John’s Hopkins outbreak dashboard sources its data from) closely now since very close to the beginning of the outbreak, and my daily routine has been to snapshot the regional outbreak tallies and […]
0 CommentsComplex passwords can save users from being hacked—any IT admin will tell you that. Plus, countless studies and articles on password security have been published about why password policies are vital to online security. Increasing the length of passwords, adding complexity to them and never reusing passwords more than once … these are three examples […]
0 CommentsCoronavirus Outbreak Causes IT Industry to Identify New Threat Preparation Strategies, Accelerated Strategies Group, MediaOps, JumpCloud, and DevOps Institute Commission New Study BOCA RATON, Fla. and BOULDER, Colo. – Feb. 17, 2020 – Accelerated Strategies Group, the analyst company whose mission is to democratize access to industry expert knowledge, MediaOps’ IT as Code community platform, […]
0 CommentsVirtual Event Capabilities Allow Event Organizers to Afford Attendees, Speakers and Sponsors a Near Identical Experience to In-Person Physical Events BOCA RATON, Fla. — February 17, 2020 — Amid growing concerns over the spreading coronavirus, MediaOps, the leading global media platform for technical communities, is now offering a Conference Disaster Plan (CDP) aimed at […]
0 CommentsWith all the hype surrounding the coronavirus, let’s take a step back, take a breath and not give in to emotional conference mob fear-mongering We have all read the headlines: Mobile World Congress in Barcelona has been canceled. Facebook pulled the plug on a smaller conference next month in San Fransisco. IBM Security has pulled […]
0 Comments