Cisco made enhancements to its security offerings that will expand and change the way customers buy its Secure Access Service Edge products as well as bolster network-access authentication. Cisco’s SASE plan will focus on enhancing networking and security functions while building them into an integrated service that can help simplify access to enterprise cloud resources […]
Archives for March 2021
What are NFTs and are they just another digital fad?
While you may not have heard the term ‘non-fungible tokens’ (NFTs) before, this digital concept has exploded in the art, music and gaming sectors of late. To this end, a number of high-profile NFTs have been sold globally during Q1 2021, with one fascinating project seeing a digital token representing a burnt piece of Banksy […]
How to build a honeypot to increase network security
A honeypot is a network device that tricks hackers into thinking they’ve broken into an organization’s real network when actually they are in a fake network set up as a trap. Once lured into a honeypot, an attacker’s activities can be monitored and analyzed. Honeypots are designed to attract hackers, and the more convincing they […]
A breakdown of core AWS identity services
Identity and access management are critical components to keep applications secure, and AWS offers a range of tools and services. With these services, IT teams can avoid the otherwise time-consuming nature of implementing an effective and secure way to control access to various components. Choosing the right AWS identity service depends on various factors that […]
Distractions and the downsides to working from home
Remote workers cite a decrease in life satisfaction, more reliance on mobile devices, longer hours than at the office and fewer perks, according to a new survey by Joblist. Image: iStock/stefanamer For many, remote work wasn’t a choice but thrust upon them due to the rapid evacuation of on-premises offices because of the COVID-19 pandemic. […]
Set up persistent storage for containers in the cloud
Persistent storage for containers is a common need among enterprise users, including those who run workloads in the cloud. Container instances are ephemeral; once an individual container is destroyed, it leaves nothing behind. As a result, workloads that require persistence — whether by saving state and work products or accessing a shared database — must […]
Amazon is reportedly developing custom networking chips
Amazon is reportedly gearing up to produce its own networking chips in face of the global shortage, The Information has learned. The in-house chips would be used for Amazon’s internal IT infrastructure and AWS, speeding up the cloud division’s data centre servers as well as enhancing its artificial intelligence (AI) services, according to the information obtained by the publication. The move would diminish the need for the company […]
VMware patches critical flaws in vRealize AI platform
VMware has patched a pair of vulnerabilities that could have given attackers access to admin credentials and file writing access. The company stated that the first vulnerability, CVE-2021-21975, could allow a malicious actor with network access to the vRealize Operations Manager API to perform a Server Side Request Forgery attack to steal admin credentials. VMware evaluated the danger […]
Innovation in a COVID World: 4 Steps for CIOs To Get It Done
You want to launch new products, meet your customer’s needs, and grow the business. Here’s how. Image: natali mis – stock.adobe.com Stepping outside your comfort zone is a sure-fire recipe for personal growth. The same goes for business. COVID-19 forced companies to use tech to adopt, reinvent, and innovate on the fly. Restaurants modified loyalty […]
Google Stack is an AI-powered document scanning app
Google has built an AI-powered app that lets users scan physical documents and automatically organise them into Google Drive. “Stacks” can analyse bills, receipts and any paper documents you have laying around the house and uses artificial intelligence (AI) to scan and categorise before turning them into a PDF. Users only have to take a photo of […]