As a self-aware social media geek, I thought todayâ€™s observance of Embrace Your Geekness Day would be the perfect time to dive into the business benefits of being a geek. It is hard to believe I am already almost done with my summer social media internship at SingleHop. It has been a great investment of […]
Andy Pace, COO of SingleHop, interviews Steven Coty, Chief Security Evangelist of Alert Logic. Topics of discussion include HIPAA and PCI compliance, proper security protocols, DDoS attacks, web application firewalls, and more.
Andy Pace, COO of SingleHop, interviews Steven Coty, Chief Security Evangelist of Alert Logic. Topics of discussion include HIPAA and PCI compliance, proper security protocols, DDoS attacks, web application firewalls, and more. Keep an eye out for part 2!
Your data is only as good as your last back up. And any business thatâ€™s lost its data or the ability to access its critical applications and operations can painfully attest to that fact. Todayâ€™s data is increasingly at greater risk. Thereâ€™s simply more of it. Industry sources say digital data is doubling at a […]
Let World Backup Day Remind You Not to be a Statistic for Lost Data Have you backed up your data recently? Every day businesses are creating and collecting critical data that they mustÂ protect; data that is essential to running and growing their companies. How are you protecting your critical business data? What would happen to […]
Data centers get a bad rep because theyâ€™ve always been big wasters of power and cooling energy in the past. Theyâ€™re 100 times more energy intensive than an office and most server racks are well in excess of 30kW. Theyâ€™ve gone from using 1.3% of the United States electric output in 2011 to an EPA […]
Earlier today, the PR firm used by the security vendor Qualys prematurely leaked vulnerability details regarding a critical vulnerability in the GNU C library.Â The vulnerability exists in all versions of glibc since 2000. The vulnerability itself is a heap-based buffer overflow in __nss_hostname_digits_dots(), which is used by the gethostbyname() and gethostbyname2() glibc function call. […]
This year promises to be a big one in terms of new and improved cloud services. Thatâ€™s not just our opinion: Itâ€™s also the opinion of those throughout the technology industry. In December, we reached out to nearly 200 bloggers and experts in various technical fields and asked them what they thought 2015 would look […]
A major factor in any data center is security. And CHI-3â€™s security levels are going to be state-of-the-art from the Digital Realty Trust campus to our own private NOC. At the most outer level, the Digital Realty Trust campus has a plethora of security checkpoints, including a perimeter fence, surveillance cameras at every turn, and […]
Cyber attacks and data breaches are on the rise as we move into the middle of the second decade of the twenty-first century. Looking back at 2014, itâ€™s clear that hacking and the compromise of personal and business information is no longer merely something that happens to one company here or there, but it is […]