Digital attackers in 2018 need to focus on one key challenge: “how do I deliver the best possible value to my clients, without significantly increasing cost.“
7 IT Operations Challenges to Attack in 2018 – EMA Punch List
By Torsten Volk on Dec 28, 2017 12:46:11 PM
The Internet of Things will Drive Network Management Evolution
By Shamus McGillicuddy on Jul 26, 2017 3:34:24 PM
EMA research has determined that network managers will need to upgrade, expand, and adapt their network monitoring and management tools and practices if they are going to support the Internet of Things (IoT).
InterConnect 2017 – Showing off a whole New IBM
By Torsten Volk on Mar 24, 2017 10:31:12 AM
"Today, a dev team leveraging Kubernetes containers can get a cloud app up in minutes." This statement by Arvind Krishna, IBM’s GM for Hybrid Cloud, at the beginning of his InterConnect 2017 keynote should have received a lot more recognition than it did. This one sentence shows the fundamental shift in IBM’s strategy, away from the old Tivoli-centric IT ops company and toward a modern DevOps-focused organization that is looking for differentiation up the stack. Today’s IBM encourages developers to deploy entire application environments without IT administrators even being aware.
IoT Enterprise Risk Report
By David Monahan on Dec 21, 2016 2:47:12 PM
ForeScout recently released an IoT Enterprise Risk Report based on research from ethical hacker Samy Kamkar. Based on Kamkar’s findings, the report on IoT security issues could readily be renamed something like, “IoT: the bane of the enterprise environment,” or “IoT brings new meaning to the term ‘Enterprise Risk’.”
The Top 5 IoT Lessons I Learned From Hollywood
By David Monahan on Sep 23, 2016 12:07:46 PM
In my last IoT blog, I talked about the history of IoT and the evolution of issues surrounding IoT devices. In this part of the series, we will expand on the issues around IoT and the data it collects.
The Rise of Thingbots in the Internet of Things (IoT)
By David Monahan on Nov 20, 2015 12:50:39 PM
The Internet can be a pretty scary place. Places like the dark web exist in the form of trading houses with stolen personal information from credit cards and social security numbers, to health records and full identities being obtained for a price. Malware development and deployment and other attack services such as DDoS and botnets can be rented by the hour. Recent reports indicate that DDoS attacks are increasing in both frequency and size, and the problem of botnets being used as attack networks or launch points in DDoS and other malicious activities is significant. Indications are that it will only continue to get worse.