How Advanced Analytics and Predictive Simulation Help Data Centers Enhance Performance

Credit to Author: Torben Nielsen| Date: Thu, 29 Jun 2017 15:39:07 +0000

According to the Uptime Institute (an independent division of the research company 451 Group), “the market for Data Center Management Systems, of which Data Center Infrastructure Management (DCIM) systems represent… Read more »

The post How Advanced Analytics and Predictive Simulation Help Data Centers Enhance Performance appeared first on Schneider Electric Blog.

Read more

A Chromebook can increase the protection of air-gapped computers

Credit to Author: Michael Horowitz| Date: Wed, 28 Jun 2017 14:03:00 -0700

I used to think the best way to protect a computer hosting sensitive data was by not connecting it to any network, a process known as air gapping. Ah, the good old days.

WikiLeaks recently revealed that when a computer with the sensitive data is running Windows, even air gapped protection is insufficient. The CIA, using a software system codenamed Brutal Kangaroo, first infects a Windows computer connected to the internet, then infects any USB flash drive (a.k.a. thumb drive) plugged into that computer in the hope that the flash drive will eventually be plugged into the air-gap protected machines.

To read this article in full or to leave a comment, please click here

Read more

Preventing Cloud Blindness

Credit to Author: John Maddison| Date: Thu, 29 Jun 2017 12:59:00 +0000

For many organizations, embracing the potential of the new digital economy involves migrating services, data, and infrastructure to the cloud. The cloud is a powerfully disruptive technology. It allows businesses to be more agile, responsive, and available than ever before by transforming traditional compute architectures and best practices that have been in place for decades. Most organizations today have some sort of a cloud strategy. Nearly all of them are adopting a hybrid cloud infrastructure that combines their private cloud with one or…

Read more

A Technical Analysis of the Petya Ransomworm

Credit to Author: Margarette Joven| Date: Wed, 28 Jun 2017 12:05:00 +0000

Yesterday, a new ransomware wreaked havoc across the world. This new malware variant, which combines the functionality of ransomware with the behaviors of a worm, is being called Petya, Petrwrap, and even NotPetya, since researchers are still investigating as to whether its ability to modify the Master Boot Record of a targeted machine is based on the Petya family of malware. Fortinet has designated this new hybrid form of malware as a ransomworm, and this outbreak was reported to use the same worm mechanism to spread across the Internet as WannaCry,…

Read more

A Chromebook can increase the protection of air gapped computers

Credit to Author: Michael Horowitz| Date: Wed, 28 Jun 2017 14:03:00 -0700

I used to think that the best way to protect a computer hosting sensitive data was by not connecting it to any network, a process known as air gapping. Ah, the good old days.

WikiLeaks recently revealed that when the computer with the sensitive data is running Windows, even air gapped protection is insufficient. The CIA, using a software system codenamed Brutal Kangaroo, first infects a Windows computer connected to the Internet, then infects any USB flash drive (a.k.a. thumb drive) plugged into that computer, in the hope that the flash drive will eventually be plugged into the air-gap protected machines.

To read this article in full or to leave a comment, please click here

Read more