To enable businesses to keep up with the competition and the pace of digitization, NetApp announced last year their new SANtricity software for both its EF-series all-flash and E-Series storage...
SD-WAN is a virtual Wide Area Network (WAN) architecture that is designed to allow businesses to leverage networks to meet the growth of cloud computing and other mobile devices. SD-WAN leverages on...
Accredited to: Dr. Dzaharudin Mansor
Authentication is the process of correctly verifying a user’s identity. It answers the question of, “who are you?” when a person...
A secure SD-WAN is as the name suggests: A Software-Defined Wide Area Network that is protected across the multiple branch locations it covers.
Now, an SD-WAN is typically designed to include...
Security posture is a measure of the cybersecurity strength of an organisation’s network, information, and systems. This includes an enterprise’s threat management and response...
Security-driven networking is a modern approach in network infrastructure where security should be inherent within the environment. In this approach, importance is placed on both security and...
Serverless computing is an approach in cloud computing wherein an application is run using third-party services, client-side logic and cloud-hosted remote procedure calls (Functions-as-a-Service)...
Security Information and Event Management (SIEM) is a set of services and tools that combine Security Information Management (SIM) responsible for the consolidation of log files and data to generate...
The concept of storing data in a secure ledger is expanded to include computation in a smart contract. Therefore, they are essentially contracts that are carried out automatically and without the...
Social engineering refers to a variety of tactics that can be used to trick people into becoming a victim of cybercrime, for example, by opening a malicious attachment, clicking on an unsafe link or...