Everyone these days seems to want to operate like the massive scale data center operators or at least capitalize on the economies of scale they created in their wake. It's a familiar trickle-down economics idea that sounds great o...
Next week, some 30,000 security professionals will descend upon the Moscone Center in San Francisco for the 2017 RSA Conference. Cisco's AMP Threat Grid, the first unified Malware Analysis and Threat Intelligence solution, partner...
We previously discussed how data models have become a key component of network programmability and the role they play in cloud-scale networking. Data models provide a clear representation of the capabilities of a networking device...
Retailers are embracing and adapting to digital innovations to keep pace with rapidly-evolving customer demands. Online and mobile purchases continue to increase exponentially. According to Deloitte, 58% of consumers have used the...
This blog was authored by Warren Mercer and Paul Rascagneres. Talos has observed a small email campaign leveraging the use of Microsoft Publisher files. These .pub files are normally used for the publishing of documents such as ne...
Over the decades' many songs have been written about Germany's capital city with one song stating that "Berlin ist eine Reise wert" or Berlin is worth a visit. I have been to Berlin a few times and agree if your time allows I enco...
Healthcare providers across the globe are recognizing the need for digital technology in their hospitals and practices. But with ever-tightening budgets and numerous priorities, where exactly should they focus their investmen...
The application development landscape is changing. Innovation that has its roots in startups, APIs, cloud computing, containers and microservices is quickly making its way into the enterprise and into verticals such as manuf...
Primary Author Bio -Lori MacVittie is responsible for education and evangelism of application services available across F5's entire product suite. Her role includes authorship of technical materials and participation in a num...
Customers are increasingly expecting flexible,on-demand services. Changing your network through virtualisation is key to being able tomeet these demands These days, people's lives are busier and less predictable. Circumstances cha...
I've spent a lot of time hearingfromour customers about cloud adoption and there are three things they all agree on: (1) it's essential to digitization, (2) not everyone starts the journey in the same place, and (3) there is no on...
Malware is one of the most prevalent and most insidious forms of cyber attack. Identifying and eliminating them are critical in minimizing the impact of a breach. As a cybersecurity incident responder, I always end up ...