Now that mass and social media are booming, it is normal for marketing to take over and for technological terms to become more trivialized and popular. We are all familiar with cloud computing, now linked to edge computing, blockchain, the metaverse, AI, etc. However, the concept that has taken this year by storm is cybersecurity, and it would be unwise not to analyze it in depth. ...
Why the cybersecurity threat to banks has so significantly increased
Bank ATM cashpoint machines have always been prime targets for both physical and cyber threats for obvious reasons; they contain large amounts of cash and sensitive customer information. Yet, as the growth in hybrid working and migration to cloud applications has…
Ensuring cybersecurity for healthcare research data
In the wake of the pandemic, nations worldwide are seeking a return to good public health and economic recovery. Any such return can be critically aided by an adequate supply of vaccines which can be administered to millions of people without a hitch.However, the SARS-CoV-2 vaccine supply chain – which tackles the COVID-19 disease – is rife with logistical complexities. Additionally, the...
The main advantages of OpenStack and its deployment methods
Due to the growing demand for resources driven mainly by the increasing number of devices with Internet access, it’s hard to find organizations or companies today that aren’t benefitting from the advantages of cloud computing. Acquiring and maintaining expensive hardware and software resources, as well as optimizing these resources in the most optimal way possible, poses a set of challenges that...
Digitalizing SASE to enhance network protection in the cloud age
SASE – Secure Access Service Edge – is increasingly important as flexible working becomes a standard aspect of corporate IT. Managing cyberthreats is steadily more difficult as the traditional network perimeter disappears. With employees working remotely and new services being regularly deployed to the cloud, the IT security team is managing thousands of additional end points. Each node...
Towards a Thin CPE
It has been more than 10 years since desktop virtualization, generally found under the acronym of VDI technology, Virtual Desktop Infrastructure, was proposed as one of the main technological drivers for providing greater flexibility, efficiency and control to the workstation (PC) – increasingly destined to become “hardwareless” and distributed between multiple devices (as pointed out by the...
Categories