Addressing Known and Unknown Operational Technology Threats

The Fourth Industrial Revolution is a convergence of technologies that is blurring the lines between the physical and digital worlds, known as cyber-physical systems. And it is utterly transforming the technology systems that support things we don’t usually see, like manufacturing, transportation, energy production and distribution, water and waste management, Continue Reading

ReadySpace Maintenance

Urgent: Maintenance in progress – ReadySpace Cloud Platform

Dear customers,    We will be performing an emergency maintenance between 11am (1100hrs) SGT, and 1pmm (1300hrs) SGT, today 29 January 2019.   Some users on the Cloud Server platform may experience minor disruptions to their service during this maintenance exercise.  We apologise for any inconvenience that may inadvertently occur.    ReadySpace Team

Ubuntu News

Snap up your development – Tools for making the snap trek easier

Software development is what happens in between users and bug reports. Niccolo Machiavelli In an ideal world, developers would be able to create new applications without any errors, and live happily ever after. Unfortunately, errors, warnings and bugs are an inseparable part of the process. Sometimes, these problems are caused Continue Reading

Information Governance for Healthcare Institutions

Information governance is nothing new, but for it to be effective, it requires understanding, flexibility, and collaboration between a variety of teams and departments. Fortinet’s Susan Biddle offers her insights into the role of information governance in organizational security and how healthcare organizations can adapt. Can solid information governance boost Continue Reading

Energy and Utilities Benefit from Mobile

Energy and Utility companies’ work is distributed far and wide, between residential homes, businesses, schools, and wherever else the supporting infrastructure exists. Territories for field workers can often span a few towns wide and without a plan on prioritizing their sites, time and money can be wasted on unproductive routes. Over two Continue Reading

Improving the Parallel Applier with Writeset-based Dependency Tracking

MySQL 8.0.1 introduces a new mechanism to track the dependencies between transactions. This feature is used to optimize the binary log applier on asynchronous replication slaves, improving the throughput significantly on workloads where there is low-concurrency on the master and/or on systems with very fast storage. Before diving into that Continue Reading

Q&A: Information Sharing and Trust in Cybersecurity Today

With cybercrime such a big concern these days, cooperation and information sharing between public and private organizations has never been more important. We recently talked with Derek Manky, Global Security Strategist at Fortinet, to get his thoughts on the difficulty, and importance, of trusted networks for sharing information in the Continue Reading

Evenly Distributed Future

Traveling back and forth between the UK and US I often find myself answering the question “What does CloudFlare do?”. That question gets posed by USCIS on arrival and I’ve honed a short and accurate answer: “CloudFlare protects web sites from hackers, makes web sites faster and ensures they work Continue Reading

Using Context to Predict the Future

The vast majority of security strategies are reactive. The goal is to close the gap between the time to compromise and time to discover. According to the 2016 DBIR report, this compromise time is minutes for a majority (over 80%) of breaches. Solving this problem is complicated because threats are Continue Reading

>