Cyber Security Predictions: 2019 and Beyond

| February 6, 2019

article image
In anticipating the major cyber security and privacy trends for the coming year, you can find plenty of clues in the events of the past 12 months. Among the now familiar forms of attack, cyber hacks of major corporate systems and websites continued in 2018 and will inevitably be part of the 2019 cyber security scene. Many well-known organizations around the world suffered significant breaches this year. The single largest potential data leak, affecting marketing and data aggregation firm Exactis, involved the exposure of a database that contained nearly 340 million personal information records.

Spotlight

Blue Violet Networks

Your All-in-One Partner for Security Systems Integration and Business Communication Technology since 1979. Blue Violet Networks is a leading provider of voice, data, and video solutions for a range of organizations—from the very small, single site office to the multi-site, large enterprises. With an extensive portfolio of solutions we’re able to assess and present ideas to help you establish or improve your applications infrastructure—think of us as an extended member of your IT staff.

OTHER ARTICLES

WIRELESS DATA CENTERS AND CLOUD COMPUTING

Article | April 13, 2020

One of the most exciting areas of Vubiq Network’s innovative millimeter wave technology is in the application of ultra high-speed, short-range communications as applied to solving the scaling constraints and costs for internal data center connectivity and switching. Today’s limits of cabled and centralized switching architectures are eliminated by leveraging the wide bandwidths of the millimeter wave spectrum for the high-density communications requirements inside the modern data center. Our patented technology has the ability to provide more than one terabit per second of wireless uplink capacity from a single server rack through an innovative approach to create a millimeter wave massive mesh network. The elimination of all inter-rack cabling – as well as the elimination of all aggregation and core switches – is combined with higher throughput, lower latency, lower power, higher reliability, and lower cost by using millimeter wave wireless connectivity.

Read More

Cyber security best practice in mission critical SCADA systems

Article | April 6, 2020

Due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensueWith cyber-attacks fast becoming the weapon of choice to compromise critical infrastructures, the need for a proactive approach to cyber security in SCADA systems has become imperative. Security is a much larger issue than often realized, as many cyber-attacks on SCADA system still going un-reported. There are several reasons why many cyber-attacks are swept under the carpet, including to protect brand reputation or to avoid highlighting vulnerabilities that could attract further attacks. However, due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensue.

Read More

Edge computing environments: what you need to know

Article | March 24, 2020

The saying goes: “If you’re not on the edge, you’re taking up too much space”. And compute itself is now moving to the edge, forcing datacentre operators to wring the last drops of productivity from their infrastructure, ahead of a future supporting multi-sensor internet of things (IoT) devices over 5G for machine learning, and even artificial intelligence (AI). Jennifer Cooke, research director of cloud-to-edge datacentre trends at IDC, says datacentre operators need to start thinking about how many systems they will need to roll out, and the people they will need to support them. “Cost becomes the prohibitive factor,”

Read More

Lenovo Looks to Automate Edge Computing

Article | March 3, 2020

Charles Ferland, vice president and general manager for networking and communications service providers at Lenovo Data Center Group, said the Lenovo Open Cloud Automation (LOC-A) framework provides a single pane of glass through which IT teams can not only provision IT infrastructure but also invoke other frameworks to automate, for example, the deployment of virtual machines on top of that IT infrastructure. Ferland said while there are plenty of frameworks for automating the deployment of virtual machines, many IT teams will spend weeks manually provisioning IT infrastructure. LOC-A provides a mechanism to reduce the time and effort required to minutes. However,

Read More

Spotlight

Blue Violet Networks

Your All-in-One Partner for Security Systems Integration and Business Communication Technology since 1979. Blue Violet Networks is a leading provider of voice, data, and video solutions for a range of organizations—from the very small, single site office to the multi-site, large enterprises. With an extensive portfolio of solutions we’re able to assess and present ideas to help you establish or improve your applications infrastructure—think of us as an extended member of your IT staff.

Events