Category: Knowledge

A Close Look at AWS

Amazon Web Services (AWS) has become commonplace as the backbone of many businesses’ infrastructure and offers a variety of uses, including being a means for acquiring big data computing and software development. Enterprises and developers can use AWS to create, deploy, run, maintain, and keep track of applications in the cloud. This public cloud computing… Read more »

The Linux Kernel: Designed for High Performance Servers (2 of 4)

A simple definition of computer process management is the process by which the software platform, or operating system, allocates computer resources to application and operating system processes. For most applications, system processes are split into two distinct levels: the “kernel level processes” and the “system level processes”. The term “kernel level processes” refers to system… Read more »

Preventing and/or Recovering from WannaCry Ransomeware Attack

You don’t want to be a casualty of any ransomware threat, including WannaCry. This cyberattack hit over 300,000 computers in 150 countries. Most of the victims were in Asia, although systems in Europe and the United States were also affected. Consider yourself lucky if you did not boot up to a screen that demanded a $300… Read more »

Public Cloud: Are You Risking Security?

Cloud computing offers many benefits for businesses and consumers, however, many businesses worry that using the public cloud to store their data could open them up to security risks. Thankfully, the public cloud does not pose the same security risks today as it did in its early years. Let’s take a look at the potential… Read more »

The Linux Kernel: Designed for High Performance Servers (1 of 4)

The Linux kernel features several components at the code and functional level.  The components include the system call interface that provides a communication interface conduit for the process management, memory management, file system, device control (drivers), and networking components. These kernel subsystems provide the means necessary to support essential functions including multitasking, virtual memory implementation,… Read more »

Top 4 Reasons to Move to the Cloud

Everyone talks about moving to the cloud, this magical land of cost savings and technical efficiencies/automation. Yet many people don’t talk about the thing to consider when moving to the cloud and how you realize these gains. Sometimes it is not that easy and it takes some serious changes to your applications or sites if… Read more »

Database Security Essentials for Your Organization

Approaching database security from a holistic and layered perspective is essential to protecting your organization’s valuable information. Database security involves not only the database itself, but also the operating system upon which the database is running, as well as the hardware platform and networks that provide database connectivity. Hence, a database security plan, like most… Read more »

Hack Prevention and Best Practices

Being hacked has serious implications. The effects are wide-ranging and can cost you a lot of money. The best way to mitigate the impact is by preventing the hack from happening in the first place. Reducing the available attack surface is a great way to accomplish this. Here are a few actions you can take… Read more »

How to Handle a Data Breach

When a breach happens, how you proceed and the actions you take will help mitigate the impact to your bottom line. The type of information stolen generally dictates the seriousness of the entire situation. Back everything up fresh. Treat it like a police crime scene and preserve the evidence. Logfiles, configuration files, and affected data.… Read more »

How to Prevent Data Breaches

The question “How to prevent data breaches?” is similar to ‘how do you prevent car break-ins?’ Cars are still very easy to break into. Their windows are not made of steel. However, you can make the hassle and risk of breaking into the car outweigh their desire to get inside. Keeping money, valuables out of… Read more »