Virtualization Requires New Models for Old Technologies Driving a car is like riding a bike, if one refers to the old expression. It is fairly easy to Frank Yue |July 11, 2017
Future-proof your Cisco ACE refresh It has been a while since Cisco announced end-of-life for its Application Control Engine (ACE) products. The last date of Prakash Sinha |June 29, 2017
SCADA: Changing the Dynamic How do we build a truly resilient security framework directly incorporating micro segmentation into the SCADA systems and our network Daniel Lakier |June 28, 2017
The World is Changing The world is changing; it always has but the world is changing faster now than it ever has before. This Daniel Lakier |June 07, 2017
Route Domains – Half-baked Virtualization Delivers Half-baked Results Imagine browsing your favorite websites on your computer or playing a browser-based game when things start slowing down. You click Frank Yue |May 24, 2017
Every Digital Yin has a Physical Yang In the year 1453, the Ottoman Empire under Sultan Mehmed II was able to accomplish what none before them had Daniel Lakier |May 23, 2017
Cloud WAF: Why a Checkbox Isn’t Enough I remember when I first learned about Web application firewall technology. It seemed like magic to me: A device that Daniel Lakier |May 10, 2017
SCADA Part 4: The Network in Focus In this blog post we will cover the basics of building a truly resilient network where throughput isn’t always important, Daniel Lakier |April 20, 2017
Making Public Cloud Migration a Turnkey Process Public clouds are great for managing applications and data without the frustration and expense of supporting the underlying infrastructure. When Frank Yue |April 05, 2017
You Cannot Do Application Delivery Without Security Security is an ever-evolving concept in theory and application. It is important to deploy and leverage technologies that can adapt Frank Yue |March 30, 2017
Trends in Software Defined Data Centers I recently met with a regional cloud service provider (CSP) that has adopted provisioning on demand as their IT model. Prakash Sinha |March 29, 2017
SCADA Part 3: Mission critical, highly vulnerable, almost un-protectable. I’m back with another exciting installment on SCADA security. Today I want to cover authentication and System redundancy.It should be Daniel Lakier |March 23, 2017