10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
OpenStack for enterprise: The tipping point cometh
A brief history of the OpenStack cloud operating system, its releases and projects, and significant enterprise adoptions.
Dangers of the deep, dark web
A high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P. There are other, similar anonymous networks, but these are the two most used.
The evolution of ransomware
How different types of ransomware work, not just from a technological point of view but also from a psychological viewpoint.