Category: Latest

Demystifying the Cloud

It seems no matter where you turn, you can’t escape the buzzword of “the Cloud.” Whether it’s a place to put phone data, the newest version of software, or just the ever-present promise of “It’s better because it’s now in the Cloud!”, it seems like everyone is poised to take advantage of the progressive, somewhat… Read more »

Myriad & Girl Develop It March Campaign Kicks Off today!

Just a reminder that the March 2015 Myriad & Girl Develop It Campaign kicks off today! Join us on Twitter to help raise money for GDI and enter to win a Dell XPS 13 Ultrabook! Here’s how it’s going to work: We’ll post a question to Twitter each day starting today relating to women in tech… Read more »

The Great WiFi Migration

Cloud this, virtual that… it’s the future, and mostly it’s a good thing! Welcome to the great WiFi expansion, folks! The Past Not too long ago, when people started deploying multiple wireless access points (APs) in a single location, they realized how cumbersome it was to manage all APs individually. The masses demanded a way of… Read more »

BYOD: Is it Worth the Risk?

The Bring Your Own Device (BYOD) phenomenon has become a highly debated topic in many organizations. While some enterprises are fully enveloped in the BYOD trend, others are hesitant to adopt this new strategy because of the numerous risks associated with it. Regardless, here is what you need to know to be BYOD-ready.

Jibba Jabba or the Nines Nines Nines

You’ve probably heard “nines” thrown around when talking high availability, so let’s review them to make everyone talk the same talk or IT Jibba-Jabba.

High Severity GnuTLS bug

On May 23rd, Nikos Mavrogiannopoulo (one of the primary authors of the GnuTLS library) submitted a commit identifying the potential for “memory corruption” during the TLS/SSL handshake process. This specific bug makes it possible to initiate a server-based attack on a client system by corrupting its memory using a specially crafted ServerHello message.

Heartbleed: A Case For Two-Factor Authentication

By now you’ve probably heard about a major vulnerability in the OpenSSL Project’s implementation of SSL known as Heartbleed. If you’re not familiar with SSL, it is a protocol designed to secure communication between an end-user (client) and application (server) using cryptography and keys intended to make it difficult to intercept and read protected traffic…. Read more »

DDoS Ammunition: Are you protected?

Saar here, resident engineer at Myriad Supply. Today I’ll be discussing DDoS ammunition. The FFIEC gives “recommendations” to banking institutions.  This is a non-binding recommendation, and there is no law per say that says you must have DDoS protection.  However, if someone suffers financial damages due to a DDoS attack on a bank, that person… Read more »

Breaking news: Ruckus Will Be Joining The Cloud!

That’s right people, the Controller based wireless giant is working on a cloud offering similar to Aerohive, Aruba and Meraki. For now, it is still too early to tell what we are exactly in for. Ruckus is keeping their cards close.  As a matter of fact, the whole Ruckus Cloud offering subject is very hush… Read more »