Fortinet Signs Important Cybersecurity Information Sharing Agreement with KISA

  • in Blog Posts
  • by
  • August 11, 2016
  • Comments Off on Fortinet Signs Important Cybersecurity Information Sharing Agreement with KISA

Fortinet’s Derek Manky offers some perspective on Fortinet’s most recent cooperative information sharing agreement and what this means for the future of global cyber threat intelligence. What did Fortinet announce with KISA today? Fortinet took another important step in an effort to bolster the future of cybersecurity. We signed an Continue Reading

Updated CentOS Vagrant Images Available (v1607.01)

  • in Blog Posts
  • by
  • August 10, 2016
  • Comments Off on Updated CentOS Vagrant Images Available (v1607.01)

Updated CentOS Vagrant Images Available (v1607.01) Wednesday , 10, August 2016 Laurențiu Păncescu announcement Official Vagrant images for CentOS Linux 6 and CentOS Linux 7 for x86_64 are now available for download, featuring updated packages to 28 July 2016 and the following improvements: Follow upstream Vagrant recommendations: The default Vagrant Continue Reading

Nominate PrestaShop! in the 2016 Critics’ Choice CMS Awards

  • in Blog Posts
  • by
  • August 10, 2016
  • Comments Off on Nominate PrestaShop! in the 2016 Critics’ Choice CMS Awards

We are once again running for the Critics’ Choice CMS Awards. Please help us get nominated in the categories: Best Open Source CMS and Best eCommerce Software Nominations close on September first, so go here to lend your support. There is no time to lose. Please nominate us in the Continue Reading

Did You Know? Using Zimbra 2FA with other Mail Clients!

  • in Blog Posts
  • by
  • August 10, 2016
  • Comments Off on Did You Know? Using Zimbra 2FA with other Mail Clients!

Did you know that if you enable Zimbra two-factor authentication (2FA) in your Zimbra account, you can still use other mail clients, such as Outlook and Thunderbird? 2FA is an extra layer of security for your email account. With 2FA enabled, to log into your Zimbra account, you need your Continue Reading

Red Hat Positioned in the Visionaries Quadrant of Gartner's 2016 Magic Quadrant for x86 Server Virtualization Infrastructure

  • in Blog Posts
  • by
  • August 10, 2016
  • Comments Off on Red Hat Positioned in the Visionaries Quadrant of Gartner's 2016 Magic Quadrant for x86 Server Virtualization Infrastructure

RALEIGH, N.C. — August 10, 2016 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced that Red Hat Enterprise Virtualization has been positioned by Gartner, Inc. in the “Visionaries” quadrant of the August 2016 x86 Server Virtualization Infrastructure Magic Quadrant. With Red Hat Continue Reading

Tuning MySQL Group Replication for fun… and profit!

  • in Blog Posts
  • by
  • August 10, 2016
  • Comments Off on Tuning MySQL Group Replication for fun… and profit!

Group Replication introduces a new way to do replication in MySQL. With great features such as multi-master replication it brings a range of exciting deployment scenarios where some difficult problems become much easier to solve. Please check a few recent blog posts about group replication here, here, and here. Group Continue Reading

Service Provider Network Virtualization Solutions Will Shine a Spotlight on Security

  • in Blog Posts
  • by
  • August 9, 2016
  • Comments Off on Service Provider Network Virtualization Solutions Will Shine a Spotlight on Security

Change is coming to service provider networking, and evolving customer expectations around agility, service flexibility, and pricing are driving it. In recent weeks, both AT&T and Verizon have made key announcements on the approach they plan to take with regard to network service virtualization – a transition birthed and catalyzed Continue Reading

Azure Security Center and Fortinet: Integrated Threat Management Solution for Cloud Workloads

  • in Blog Posts
  • by
  • August 9, 2016
  • Comments Off on Azure Security Center and Fortinet: Integrated Threat Management Solution for Cloud Workloads

Over the last 18-24 months the embrace of public cloud for critical workloads has transitioned from the “investigative” stage to “plan of record” for the majority of organizations.  Still, mysteries and major questions remain – especially when it comes to securing your cloud workloads.  Microsoft understands the needs of their Continue Reading

Black Hat Las Vegas 2016 Observations: The Security Conundrum

  • in Blog Posts
  • by
  • August 7, 2016
  • Comments Off on Black Hat Las Vegas 2016 Observations: The Security Conundrum

On Wednesday, Dan Kaminsky delivered the opening keynote address at Black Hat. His talk was entitled, “The Hidden Architecture of our Time: “Why This Internet Worked, How We Could Lose It, and the Role Hackers Play,” and detailed the challenges and risks of the Internet, and what vendors need to Continue Reading

Black Hat Las Vegas 2016 Observations:

  • in Blog Posts
  • by
  • August 6, 2016
  • Comments Off on Black Hat Las Vegas 2016 Observations:

The Show Floor I’m always interested to walk the show floor the first day of a conference to get a sense of what the vendor community has decided is important. The show floor at Black Hat is especially interesting, because while most of the vendors are responding to the security Continue Reading

Page 109 of 135« First...102030...107108109110111...120130...Last »