Data Foundry Blog

6 Differences Between Cloud Security & Data Center Security

cloud security

Cloud security has improved over the years with cloud providers working hard to minimize risk and a variety of third party vendors launching comprehensive cloud security tools, such as Alert Logic’s Cloud Defender and Trend Micro’s Deep Security. So, is the cloud now just as secure as running your own infrastructure in a data center? Here are some significant differences between cloud security and data center security.

Read More

7 Tips for a Successful Application Migration

With the ever-increasing adoption of hybrid cloud infrastructure models, application migrations have become a common occurrence. Whether you are migrating an application to your public or private cloud, these 7 tips can help you avoid costly and time-consuming errors in planning and execution.

Read More

Confused by “the Edge?” 5 Ways to Define Edge Data Centers

edge computing and the Internet of Things

Edge computing and edge data centers are buzzwords popping up in IT publications all over the Internet, but what do they really mean? Edge computing is more straightforward, and has been simply defined as “data processing power at the edge of a network instead of in a cloud or a central data warehouse.” However, edge data centers are being defined in a variety of ways followed by outrageous claims that this new data center concept will “blow away the cloud.” Your preferred definition will likely depend on your industry. Here are 5 widely communicated ones to broaden your perspective.

Read More

Take Action for Net Neutrality

fight for net neutrality Read More

What Is a Permanent DoS (PDoS) Attack?

A Permanent Denial of Service attack, or a PDoS attack, is denial of service via hardware sabotage. One method of conducting a PDoS attack is commonly referred to as phlashing. During such an attack, an attacker bricks a device or destroys firmware, rendering the device or an entire system useless. In this scenario, the victim has no other choice than to repair the device or buy a new one to restore operations. PDoS attacks have been a known possibility for several years, but these tactics haven’t yet gained traction with hackers. Our partner Radware, a leading cybersecurity firm, predicts in their 2017 Global Application & Network Security Report that this type of attack will be on the rise this year.

Read More

Stopping Petya & Global Cyber Attacks: 6 Precautions to Take

bitcoin ransom

Only six weeks after WannaCry, a similar type of ransomware has hit organizations and spread globally. Petya has mostly affected companies in Ukraine, but has also struck organizations in 64 other countries, including major companies in the U.S., such as Merck & Co and Mars, Inc. Experts are still working to understand Petya and its mechanisms of action, and no kill switch has been discovered yet. However, there are a few basic precautions announced by our partner Radware that your company or organization should take at a minimum to stop the spread of ransomware and other viruses.

Read More

Data Foundry Joins Battle for the Net

net neutrality day of action 2017

As a long-time supporter of an open Internet, Data Foundry will join forces with many other technology companies on the local and national levels to stop the FCC from doing away with the current Open Internet Order. The official Battle for the Net day of protest is July 12. However, Data Foundry is taking many additional courses of action to see to it that major cable companies don’t limit our choices more than they are already limited. Yesterday we signed a letter to the FCC to show our support of smaller Internet Service Providers in their ongoing struggle with cable giants.

Read More

The First Tropical Storm of the Season Hits – Is Your Disaster Recovery Plan Ready?

The first tropical storm to hit the U.S. this season has arrived. Cindy made landfall this morning near the Texas/Louisiana border, bringing torrential rains and strong winds. Flooding is predicted to be most severe further north and east of where the storm made landfall, with flood warnings expected to continue in Louisiana, Mississippi and Alabama.

Read More

OpSacred 2017: Financial Institutions to Face Anonymous-Driven DDoS Attacks

Anonymous ddos attacks - OpSacred

Anonymous, a notorious international network of hacktivists, launched OpSacred on June 11, 2017. OpSacred is an organized DDoS attack effort on financial institutions around the world. Anonymous is known for its DDoS attacks on government and corporate websites, and they are self-described as having “a decentralized command structure that operates on ideas rather than directives.” OpSacred is the continuation of a larger operation called OpIcarus (Operation Icarus), and OpSacred is expected to continue until June 21.

Read More

VPLS Vs MPLS and How They Work Together

vpls vs mpls network

Many business professionals who are seeking the most cost-effective and efficient solutions for their networks are unclear about the differences between Virtual Private LAN Service (VPLS) and Multiprotocol Label Switching (MPLS) and the benefits they provide. While they are two different concepts, they work together to provide an efficient and cost-effective network solution for a growing number of organizations.

Read More
Page 6 of 20« First...45678...20...Last »