Adaptive Managed Services Bolster Security

By Jason Ford, Chief Technology Officer of BlackMesh

The benefits of relying on a managed service provider are seemingly endless. Managed services can help organizations focus on business strategies, conserve funds and resources, mitigate risks, and maintain, operate, and deploy environments. In recent years, however, the IT industry has come to a crossroad where managed services meet security. With the current threats of cyber hacks and intrusion methods being what they are, security is as important – or perhaps more important – to system owners as any other advantages they garner from a managed service provider. While championing the incomparable value correlated with having a powerful and dependable infrastructure without having to manage it, enterprises now can – and do – feel the same about managed security services.

read more

Your Right to Privacy

If George Orwell was alive today, he would probably be considered an optimist as far as our right to privacy goes. That’s the perspective of our Vice President of Security Solutions and cyber security expert, Carl Herberger. Last week, Carl sat down for a Facebook LIVE event to discuss our right to privacy, and how to defend against it in the face of growing security threats. He discusses a number of recent hacks, including those on financial institutions, the healthcare system, and even dating websites, like Ashley Madison. He also addressed a number of questions from followers, such as what we should avoid posting on social media, how online privacy works, and what expectations of privacy we should have in an age of the Internet of Things and constant data breaches.

read more

Fraud on the Darknet: How to Own Over 1 Million Usernames and Passwords

Over the last several weeks, we have all become conditioned to mega leaks. 117 million from LinkedIn, 360 million from MySpace, 68 million from Tumblr and 127 million from Badoo. That’s over a half a billion emails and usernames up for grabs! This is a gold mine for hackers. Researchers are not the only ones that obtain and analyze leaked databases. Often times, hackers will keep databases for themselves so they can conduct malicious activity with the credentials.

read more

Cloud Load Balancing – Does your provider have what it takes?

Cloud computing brings cost efficiency and deployment flexibility to applications. These advantages are driving the demand for cloud-enabled applications. The move to the cloud raises concerns for service levels such as availability, security, and on-demand scalability for the applications.

For many years, application delivery controllers (ADCs) have been integral to addressing service level needs for enterprise applications deployed on premise. As data centers consolidate, end users connect remotely from a variety of locations with varied devices. Many enterprise applications are typically not designed out of the box to meet today’s quality of experience (QoE) needs.

read more

The Alpha, The Beta and The Omega: A Cyber Security Fairy Tale

There once was a big, big, company who had many powerful subsidiary companies, some of which were acquired and some of which were part of the big, big company’s heritage product lines.

This big, big company made many meaningful products and services which were both adored and deeply needed by their many customers, and whose name was known to nearly all in the land.

read more