BLOG

Ransomware attacked, what now?

On Friday afternoon, the NHS was hit by a cyber attack of historic proportions, affecting trusts and public health services nationwide. This is a stark illustration that ransomware is a very real threat, and does not discriminate when it comes to crippling businesses. In a technology age where cyber attacks and being virtually held to ransom are the new normal, it’s absolutely critical to have a strategy in place to both combat attacks when they happen, and to ultimately prevent them...

Read More

BLOG

The threat IoT devices bring to business continuity

By David Paquette, product marketing manager at Scale Computing.

Read More


BLOG

The future of memory is already here

For many infrastructure organizations and large enterprises, memory continues to be a limiting factor as system architects scale out in an attempt to access more memory.By Diablo Technologies.

Read More

BLOG

Security policies matter for disaster recovery

Professor Avishai Wool, CTO at AlgoSec, looks at how organizations should approach security policy management in their disaster recovery planning.

Read More


Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more