Black Hat USA bills itself as “the show that sets the benchmark for all other security conferences.” While most conferences tend to over-promote themselves, given the...
Spate of shocking cyber attacks on universities jolt academia
It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States...
Where the cloud touches down: Simplifying DCIM
In most data centers, DCIM rests on shaky ground: manual record keeping and scattered documentation. Data center managers maintain–and wade through–wikis, spreadsheets, text files, and...
Your Net Worth Is Online – And Less Safe Than Ever
The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the brightest minds in IT security each year — those who are...
This Week’s Five: Managed Service Providers – Reality Check!
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic each week. This week, we’ll try to...
This Week’s Five: SysAdmins are not humans, seriously!
Your network is safe, your computer is working, and your printer is running. Why? Because you’ve a great sysadmin who is keeping your business up...
Open Source Software: The Hidden Cost of Free
Recently, Michael Skok wrote that “open source is eating the software world.” As general partner at North Bridge Venture Partners, Skok should know. He’s witnessed the power of open...
Will mobile devices replace desktops in enterprises?
We keep hearing new concepts around mobile devices every passing day. BYOD, BYOA, MDM, MAM etc. have become the buzz words of IT industry. Are...