Bolstering Endpoint Security

For many organizations, endpoint security remains the weak link in their security strategy. While organizations are able to ensure that endpoint clients are installed on company-owned assets, security becomes more challenging when workers use their personal devices for work-related activities. The organizational risks introduced several years ago by BYOD have been compounded Continue Reading

The path to Ubuntu Core

At Canonical, helping customers overcome their challenges is what we do every day. In the IoT world, a common challenge we encounter is customers who are interested in transitioning to Ubuntu Core and the snapcraft.io ecosystem, but are unsure how to begin. This post covers the recommended approach. In most Continue Reading

Infographic: Snapcraft for developers

At the end of last year, we shared an infographic highlighting the adoption of snaps by users for their desktop, server or IoT devices. Those snaps wouldn’t be available without the growing number of developers building them behind the scenes. But why have developers, including those from some of the Continue Reading

Understanding containerised workloads for Telco

For telecommunications companies evaluating ways to transition and modernise their network infrastructure, cloud-native, container-based microservices architectures are a powerful solution in meeting requirements of compute needs through edge cloud and beyond. Understanding infrastructure implications and design considerations for open source hardware and software development platforms, while remaining carrier grade and Continue Reading

Prevent Leaks of Sensitive Business Data with Security Gateway

Businesses of all types must maintain records containing personal information about their employees and customers, and executives and clients alike have a mutual interest in protecting that data. But there’s no guarantee that every employee will treat confidential account numbers, Social Security numbers, passport numbers or other personal data with Continue Reading

Zero to Snap – Rev up your packaging

Software developers often have enough to worry about. Their focus is creating the best application they can, often without having to consider packaging. We recently discovered Akira, which illustrates this well. The small team of developers are hard at work on the application, so software packaging isn’t a high priority Continue Reading

Securing Legacy IT Systems from Modern Application Threats in the Financial Sector

The rhetoric surrounding mainframes and their uses in modern enterprises tends to be largely negative. Mainframes are seen by many as outdated legacy IT systems that are, or will be, obsolete in the near future as businesses increasingly move to the cloud. However, these notions are one-sided. The reality is Continue Reading

Cybersecurity Needs to be Seen as a Strategic Issue, Not Just an IT Investment

As organizations embark on their digital transformation journeys, they are seeking to tap new business opportunities, improve operational efficiencies, and deliver better services to customers. Digital transformation is driving businesses to embrace the cloud, the Internet of Things (IoT), big data, and other digital initiatives in ever-expanding waves, forcing them to reinvent and Continue Reading

Try Out the New 3CX SIP ALG – Firewall Check

3CX is calling all implementers to try and test the new SIP ALG and let us know their thoughts and results on our forums. With the beta of version 15.5 SP1 the firewall checker has been extended to check if the firewall executes SIP ALG or not. This feature will Continue Reading

>