Remove 2016 Remove Network Remove Open Source Remove Security
article thumbnail

December Tech Trends Report and 2016 Enterprise Tech Projections

CTOvision

The Trends To Track in 2016. Here is more on what we expect each will bring us in 2016: Cloud Computing : The efficiencies of this new architecture are driving compute costs down. For 2016, expect more IT departments to be buying these small form factor cloud in a box data centers. For more see: [link] TheCyberThreat.

Trends 150
article thumbnail

IDG Contributor Network: 7 ways to improve your Joomla security

Network World

Joomla has exploded in popularity as an open-source website creation tool for individuals, small and medium-sized businesses, enterprises, and developers. A wave of fake jQuery attacks hit Joomla and WordPress sites in 2015 and 2016, affecting over 4.5 million sites.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DockerCon 2016 Vendor Meetings

Scott Lowe

While at DockerCon 2016 in Seattle today, I took some time on the expo floor to talk to a number of different vendors, mostly focused on networking solutions. Using eBPF, Plumgrid has created in-kernel virtual network functions (VNFs) that do things like bridging, routing, network address translation (NAT), and firewalling.

Meeting 60
article thumbnail

VMworld 2016 Day 2 Keynote

Scott Lowe

This is a liveblog of the day 2 general session here at VMworld 2016 at Mandalay Bay in Las Vegas, NV. Wrapping management and security around the entire solution. Poonen next brings out Orion Hindawi with Tanium to show off TrustPoint to illustrate VMware’s efforts around management and security in the EUC context.

Vmware 60
article thumbnail

Snakes in the Satellites: PassiveTotal provides an update on a massive adversary infrastructure

CTOvision

For the last year Passive Total has been providing open analysis on an interesting piece of adversary infrastructure and in doing so are shedding informative light not just on that particular adversary activity but on how multiple sources of information can be pulled together to form a more complete picture of what is going on.

article thumbnail

Security products are among the most vulnerability-riddled software products

Network World

Why do you spend the big bucks for security products? But many of the top security vendors utilize open-source or third-party components and libraries which are seemingly packed with vulnerabilities. 11 of those software products overflowing with vulnerabilities were security-related products.

article thumbnail

Los Angeles IT secures the vote with open source and the cloud

CIO Business Intelligence

Aman Bhullar, CIO of Los Angeles County Registrar-Recorder/County Clerk, has heeded the call, having led a widespread overhaul of antiquated voting infrastructure just in time for the contentious 2020 presidential election — a transformation rich in open source software to ensure other counties can benefit from his team’s work.