Locking down the datacentre: A security checklist for IT administrators

Locking down the datacentre: A security checklist for IT administrators

Datacentre security is a complex subject that is unlikely to get simpler any time soon, particularly as the industry continues to expand beyond the use of centralised facilities to more distributed, edge computing-like setups. Add to this the fact that the datacentre threat landscape is ever-broadening, and it stands to reason that a lot of IT administrators may feel […]

3 steps to lock down VDI security

3 steps to lock down VDI security - itvortex

It’s a common myth that VDI is inherently more secure than traditional desktop environments, but the reality is virtual desktops are still susceptible to attacks and security issues. IT administrators can improve VDI security by following some essential best practices. Restrict, disable services A secure VDI environment is one that’s pared down to only what […]

Speed And Connectivity: The Fundamental Elements In The Science Of Cybersecurity

Speed And Connectivity: The Fundamental Elements In The Science Of Cybersecurity

When the internet was first conceived, in a Cold War-era project by the Department of Defense, the sharing of computer information was handled the old-fashioned way: point-to-point, and only among a small, tight-knit group of security-cleared government employees if the information was sensitive. It was simple and effective but, unfortunately, not very scalable. And with […]