Everything we know about GoldenEye

On January 27th, reports of a rapidly spreading ransomware attack started to emerge from Ukraine. The speed at which critical infrastructure networks were shutting down pointed to a ransomware application with a wormable component, whose virality called to mind the WannaCry ransomware. In less than three hours, the infection crippled banks, ATMs, public transport and an airport, as well as utilities provider Kyivenergo. Then it spread outside the Ukraine.

Spotlight

Styra

Styra enables enterprises to define, enforce and monitor policy across their cloud-native environments. With a combination of open source (Open Policy Agent) and commercial solutions (Declarative Authorization Service), Styra provides security, operations and compliance guardrails to protect applications, as well as the infrastructure they run on. Styra policy-as-code solutions lets developers, DevOps and security teams mitigate risks, reduce human error and accelerate application development. Learn more at styra.com.

OTHER WHITEPAPERS
news image

The Evolution of Software to Measure and Manage the Data Center

whitePaper | June 29, 2022

In a growing connected economy, new demands require modern organizations to rethink how they effectively manage their data center environment. Beyond new requirements around the cloud, architectures around edge computing are also placing new strains on business and technology leaders. In a world of constant connectivity performance, efficiency, uptime, and infrastructure visibility take center stage as leaders make decisions around their digital infrastructure.

Read More
news image

NetApp HCI with Cisco ACI : NetApp HCI Solutions

whitePaper | September 30, 2022

Cisco Application Centric Infrastructure (Cisco ACI) is an industry-leading, secure, open, and comprehensive Software-Defined Networking (SDN) solution. Cisco ACI radically simplifies, optimizes, and accelerates infrastructure deployment and governance, and it expedites the application deployment lifecycle.

Read More
news image

Data Center EVPN-VXLAN Fabric Architecture Guide

whitePaper | December 11, 2022

Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.

Read More
news image

EMERGING TRENDS IN WIRELESS INFRASTRUCTURE

whitePaper | November 30, 2022

5G, the fifth-generation cellular technology, is being deployed around the world. 5G is a transformational technology designed to provide significant flexibility and support a variety of use cases. This paper describes the emerging infrastructure trends of wireless networks for 4G, 5G, and beyond 5G. These trends provide even more opportunities to service providers for network deployments, network customization, and network optimization. These key trends include (i) spectrum trends, (ii) densification & coverage extension methods, (iii) virtualization and cloudification, and (iv) network customization and intelligence.

Read More
news image

IT@Intel: Data Center Strategy Leading Intel’s Business Transformation

whitePaper | November 4, 2022

Intel IT runs Intel data center services like a factory, affecting change in a disciplined manner and applying breakthrough technologies, solutions, and processes. This enables us to optimally meet Intel’s business requirements while providing our internal customers with effective data center infrastructure capabilities and innovative business services.

Read More
news image

Top 5 Things to Ask Your Data Center About Compliance

whitePaper | January 14, 2020

Choosing the right colocation partner is critical, especially when it comes to compliance. When you’re outsourcing your data center needs, understanding your colocation provider’s compliance, security, availability and integrity are of upmost importance. A colocation provider mitigates risk through physical and environmental controls from an operational and security standpoint. Ensuring proper maintenance and operation of critical infrastructure, along with upkeep and continual improvement of a physical security program, are part of a comprehensive compliance program. This new report from Iron Mountain provides details on what the company sees as five of the top things to ask your data center provider about compliance:

Read More

Spotlight

Styra

Styra enables enterprises to define, enforce and monitor policy across their cloud-native environments. With a combination of open source (Open Policy Agent) and commercial solutions (Declarative Authorization Service), Styra provides security, operations and compliance guardrails to protect applications, as well as the infrastructure they run on. Styra policy-as-code solutions lets developers, DevOps and security teams mitigate risks, reduce human error and accelerate application development. Learn more at styra.com.

Events