e92plus Blog

Fixing service failures with real-time solutions

Jan 19, 2018, 10:28 AM Ben Gane

Before turning to address the concept of repairing service failures with real-time solutions, the conflict of definitions about what real-time means in an on-demand world needs to be clarified so enterprises and service providers share the same expectations of what can be achieved. So-called...


Read More

Forcepoint updates on Spectre and Meltdown

Jan 19, 2018, 10:27 AM Ben Gane

The year 2018 has gotten off to a tough start with the news of the Meltdown and Spectre (CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754) vulnerabilities. This is a broad industry problem that affects almost everyone, everywhere. Processors from Intel, AMD, and ARM are all potentially...


Read More

Why are Data Breaches in the Healthcare Industry Rising Rapidly?

Jan 19, 2018, 10:17 AM Ben Gane

Florida’s Agency for Health Care Administration received the preliminary findings of a review launched by the state’s Inspector General on January 2. The review was in response to a data breach involving 30,000 Medicaid recipients on November 15, 2017. The breach was a direct result of a staff...


Read More

Why SD-WAN can create an SP network tailor-made

Jan 19, 2018, 10:15 AM Ben Gane

While service providers have been the traditional providers of connectivity services to enterprises, they have been somewhat limited to the commodity market of providing connections. The move to virtualization and ultimately telco cloud, which is enabled by network functions virtualization (NFV)...


Read More

New year, new look - Dridex via compromised FTP

Jan 19, 2018, 10:09 AM Ben Gane

Forcepoint Security Labs have recently observed a peculiar email campaign distributing a variant of the Dridex banking trojan. The campaign used compromised FTP sites instead of the more usual HTTP link as download locations for malicious documents, exposing the credentials of the...


Read More

So my Facebook has been hacked…what does that mean and what should I do?

Jan 17, 2018, 11:16 AM Ben Gane

​“If you’ve received a random message from me don’t click the link, my account has been hacked, lol” Chances are we have all received a message like this, or certainly should have, from friends or family who have had their Facebook accounts compromised and subsequently sent some or all...


Read More

Top 6 Key Advantages of Web Filtering in the Cloud

Jan 12, 2018, 09:44 AM Ben Gane

In 2001, author Jeremy Rifkin released the book, The Age of Access, which introduced the idea that we are entering a new era in human civilization and business in which ownership of assets is no longer a winning strategy. He argued that as long as you have access to an asset, who owns it is irrelevant...


Read More

The digital transformation train has left the station

Jan 12, 2018, 09:42 AM Ben Gane

If your organization isn’t already knee deep into digital transformation (DX) by now, then you’re the exception and not the rule. A recent study commissioned by NETSCOUT revealed that nearly eight in ten (79%) IT and business decision makers who were surveyed in the U.S....


Read More

Securing the Three Families of IoT

Jan 12, 2018, 08:44 AM Ben Gane

Securing the Internet of Things is difficult. One reason is the Internet of things consists of three different groups of technology. Each group has radically different architectural constraints. Securing each group requires a distinct approach...


Read More

What is the future for the Systems Administrator?

Jan 11, 2018, 08:46 AM Ben Gane

System Administrators are a key element of a sound infrastructure in any IT environment, especially when it comes to network security. Whether working to prevent threats, implementing policies or engaging with technology vendors, it is the system administrator that helps to protect the integrity...


Read More
Back
to Top