SMBs and enterprises are both juicy targets for hackers, and breach reports continue to proliferate at alarming rates. IT departments are constantly scrambling to patch servers, block vulnerabilities, and monitor for suspicious activity, but keeping up can be difficult.
A data breach response policy is an essential piece of planning for Chief Security Officers and should be known and followed all the way down to beginner sysadmins and IT interns. Here are four steps to help you craft a response to a known security breach.
It's conference season and Green House Data will be making an appearance at several industry events around the country this summer. We're also hosting a fresh batch of Lunch & Learn events in Denver and around Washington state.
Find booth numbers, dates, details, and registration links in the full blog post. We hope to see you at one or more events!
How do you present cloud computing - a somewhat nebulous concept - to the financial leadership at your company in order to prove its benefits over the long term? At organizations that have traditionally focused on in-house hardware provisioning, a subscription service can be a hard sell. Opposing arguments range from, “What are we really getting for our money?” to “You're going to spend how much every month, instead of just every couple years?!”
We decided to pick the brain of our VP of Finance, Jason Graf, to see what a financial mind thought about the cloud and how to explain cloud benefits to CFOs and other top financial executives.
According to a recent study by Emerson, cybercrime is the fastest growing cause of data center outages. To stay ahead of increasingly sophisticated attacks, infrastructure managers must combine software and hardware tools to constantly monitor, recognize, block, and remediate. Keeping an eye on network traffic is essential to accomplish this, and one developing method of network security control uses microsegmentation to do so.
Network microsegmentation is enabled by software-defined data center technology like VMware NSX. It gives network administrators new abilities to shape network traffic based on global policy, increasing security by crafting security policies around specific network segments or virtual machines.
While Oracle and MySQL remain top picks for database systems, there are many others available, from big guns like Microsoft SQL Server to the increasingly popular MongoDB. Each has its own strengths and weaknesses, so your latest IT project may find you scratching your head as you try to decide on database software.
See the difference between SQL and NoSQL databases, a comparison of the top platforms, and questions to ask in this database selection guide.