What's in a name?
With DNS-based attacks once again making headlines, Hervé Dhélin of EfficientIP explains the risks |  |
The porous perimeter
Ian Kilpatrick of the Nuvias Group and Wick Hill Group asks ‘How do you protect your perimeter when you've blown it to pieces? |
|
The abuse of DNS
Rod Rasmussen at Infoblox provides an insight into the trend for using DNS to transport data |  |
Navigating the data lake
Greg Hanson at Informatica on how to deliver crystal clear insight from industrial scale data collection
|
 |
A note of caution
Justin Giardina at iland outlines four ways of protecting against Ransomware in the Cloud
|
|
|
|
|
Comment
Welcome to the December 2016 Newsletter.
It's that most wonderful time of the year once again when we here at Network Computing put up our festive banners and deck the NC halls with signs of good cheer. Yes, nominations for the 2017 Network Computing Awards have now opened!
You now have until January 13th to cast your nominations for the networking companies, solutions and services that have impressed you the most in the past year. Vendors are also encouraged to enter project submissions for the Network Project of the Year category. Ideally these will be projects that have been carried out in the past 12 months. Projects that are still ongoing can also be entered - but they will need to demonstrate that the customer is already experiencing benefits from them. For more details please contact the event manager David Bonner at david.bonner@btc.co.uk and keep an eye on the Network Computing Awards site for further updates on the awards - and to make your nominations of course!
In the meantime we'd like to wish the readers of Network Computing a Merry Christmas and a Happy New Year - and make sure those IoT-enabled gifts are safe, for goodness sake!
Follow us :
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
|
|