Scanning ports is very popular among cybercriminals. It’s often their first step of reconnaissance to discover services they can exploit and systems they can break into as they try to steal or destroy sensitive data. Two recent examples of major breaches illustrate just how handy port scanning is to threat actors: Cyber attackers breached more […]
It’s 2:00 a.m. in the United States: Can your employees and customers in Europe and Asia access the applications running in your Microsoft Azure cloud? If you’re not sure on a 24×7 basis what the status is of your Azure servers and applications, it’s time to invest in a third-party monitoring tool. As reported by […]
Over the past week, news broke about a rogue device that had gone unnoticed on NASA’s Jet Propulsion Lab (JPL) IT network. The fact that a Raspberry Pi went unnoticed for almost 10 months is a clear signal of network management issues and lackluster security policies in place within NASA, and other government agencies for […]
Working in a DevOps environment, agility is everything. That next release needs to get into production quickly, so even a minor network issue can hamper speed and efficiency. Consider the different roles within a DevOps environment. You have your developers and testers deeply embedded in their dev and test environments, rushing to get the next […]
It’s been predicted for years that most computers will run in the cloud and your screen will be the only connection between you and the cloud. Does that mean the business infrastructures will matter anymore, and what does that mean for the future of network monitoring? Think about all the devices on the business infrastructure […]
The World Wide Web’s 30th birthday came and went this week, and though there was much to celebrate—just look how far we’ve gone since the days of America Online CDs and Yahoo! chat rooms— it also seems like the problems the Internet causes are beginning to outweigh the problems it solves. Tim Berners-Lee, who is considered the founder […]
Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal-use-only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling. This is what has driven the DevOps methodology over the past several years.
Company bandwidth usage has, for reasons other than expected growth, increased dramatically and continues to do so every year. Over time this usage is going to increase beyond your workforce’s limitations, which poses an important challenge for IT teams. How do you calculate and optimize the use of the bandwidth you have available to ensure your […]
For the first episode of the Have You Met? podcast series, Chris Payne from Advanced Cyber Solutions joined us on the phone. We got to chat with Chris about what exactly Advanced Cyber Solutions does as a company and how they are helping support and sell Ipswitch’s solutions.
In this new Defrag This – Have You Met? offshoot series, Ipswitch EMEA Sales Director, Sebastien Roques announces the Ipswitch EMEA Partner Awards for 2018.