Remove Applications Remove Disaster Recovery Remove Firewall Remove Hardware
article thumbnail

Four questions for a casino InfoSec director

CIO Business Intelligence

Physical security of the Ethernet/fiber cabling, along with the switch hardware interconnecting today’s casino floors, has become a much bigger focus of IT security teams as direct physical access can often be the starting point for unauthorized access.

article thumbnail

Password Encryption 101: Best Practices Guide for Orgs of All Sizes

SecureWorld News

Commonly utilized algorithms for password encryption are: SHA-2 SHA-2 is a family of hash functions widely employed for password encryption and other security applications due to their high level of security. Ensuring the crypto algorithm is compatible with the systems and applications that will utilize it is also vital.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #35

Scott Lowe

A discussion of “statefulness” brought me again to Ivan’s post on the spectrum of firewall statefulness. Servers/Hardware. His follow-up article on disaster recovery of DCE VM with vCHS is also pretty good. Operating Systems/Applications. Very good stuff!

Vmware 60
article thumbnail

You can easily virtualize your physical storage

Dataconomy

Server virtualization can do the trick for you if you also struggle to scale your applications to meet growing demands without breaking the bank. With server virtualization, you can easily create, move, and delete virtual servers as needed, without the need for expensive hardware upgrades or complex reconfigurations.

article thumbnail

Continuous Monitoring – Part 2

CTOvision

“Making sense” means a number of things here – understanding and remediating vulnerabilities, detecting and preventing threats, estimating risk to the business or mission, ensuring continuity of operations and disaster recovery, and enforcing compliance to policies and standards. The first thing to do to manage events is to plan!

article thumbnail

Technology Short Take 132

Scott Lowe

I think a fair number of folks may not be aware that the Nginx ingress controller for Kubernetes—both the community version and the Nginx-maintained open source version—do suffer from timeouts and errors resulting from changes in the back-end application’s list of endpoints (think pods being added or removed). Programming.

article thumbnail

Fishbowl Finds the Right Fit for Hybrid Cloud With Latisys » Data.

Data Center Knowledge

There’s a lot of business intelligence and data warehousing that require a lot of horsepower, as well as application/web servers and other applications dedicated to handling massive email volumes. They manage dedicated firewalls for us, but as far as load balancers we use the cloud. We had the same conversation about firewalls.

Cloud 189