Emerging Threats In Cyber Security, Dyn Releases 2 New Mobile Apps and More News

Sandvine and PeerApp Collaborate to Demonstrate Virtualized Content Caching Solution

PeerApp, the developer of Internet content caching technologies and the creator of award-winning UltraBand transparent caching solution, announced that it would be collaborating with broadband solution providers Sandvine and Dell to showcase the Industry’s First Virtualized Content Caching Solution at IDF 2014. The IDF or the Intel Developer Forum was held at San Francisco from September 9-11 and the Companies showcased the joint solution at Dell’s Booth #920.

This joint solution would leverage PeerApp’s UltraBand caching engine with Sandvine’s patented application-specific Divert solution that runs on virtual machines that are powered by Dell’s hardware. The blend of solutions creates Network Functions Virtualization, enabling service providers to quicky  build and deploy dynamic, virtualized networks that meet their requirements.

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%

Read the full story at CDN Advisor.

How to evaluate a DDoS mitigation solution

IDG Research found that it takes an average of 10 hours before a company can even begin to resolve an attack. On average, an attack isn’t detected until 4.5 hours after its commencement and typically an additional 4.9 hours passes before mitigation can commence.

With outage costs averaging $100,000 per hour, it means that a DDoS attack can cost an Internet-reliant company $1 million before the company even starts to mitigate the attack. Like any web security solution, a mitigation solution must fit your business requirements, as well as protect your IT infrastructure. Akamai’s  free eBook “Threats and Mitigations: A Guide to Multi-Layered Web Security” covers all the key points of web safety. When it comes to building a strong DDoS mitigation defense you can’t rush into the first solution that is returned by a search engine.

You can download the eBook for free at Akamai.

Check the article at Akamai Blog

Dyn Releases Two New Mobile Apps

Dyn, the Internet Performance firm announced the release of two new mobile apps, available for Android and iPhone. Dyn WHOIS and Dyn Dig, have already been downloaded more than 30,000 times and are available for free in the iTunes store and Google Play.

Dyn WHOIS is a utility that allows users to query the global and many country code WHOIS servers for the domain name contact information. The information can be used to find the individuals or entities responsible for the registration of a domain, as well as the registration and expiration times of the desired domain.

Dyn Dig is a utility application that allows users to query a specified DNS server or their carrier’s DNS servers for public DNS records. In the records, users can find information such as the domain’s actual IP address along with the authoritative servers for that domain. The apps mark the first phase of Dyn’s mobile strategy, that will soon evolve into the company’s core product areas. Additional tools are also in development.

Check the full story at Dyn Blog

Graphene And The Internet of Things

In 2013 the European Union’s Future and Emerging Technologies or FET announced its $2.3 billion grant. The mission of the program was to enhance new technological solutions based on graphene. The program aimed to promote high-risk research in the field of high technologies.  All the expected discoveries will be a breakthrough in Cloud Computing and Internet of Things.

Graphene is a super-material that can actually provide a new approach and value to everything that modern high technologies own these days. Graphene, as compared to silicone (a super-material for electronics), doesn’t possess an “energy gap”, and cannot be turned on/off. We’ll be granted an opportunity to enjoy surprisingly thinner high tech items of unmatched power. This can be true of both super-light conductors and unbelievably powerful world’s processors. The angle of faster processors will mean faster deliverability of data from the Computing and into the Cloud. Graphene’s unique properties include conductivity, strenght, flexibility, transparency and it’s two dimensional (each layer is one atom thick, giving a unique electrical and computing properties). Like plastics, graphene could potentially be used in a broad variety of materials and situations.

Infographic about graphene's properties and potential applications.
Infographic highlighting unique properties of graphene.
Infographic on potential applications of graphene in computing, materials, and energy.
Infographic about graphene's potential in computing, energy, and materials.
Informational card detailing Lomiko Metals and Visual Capitalist.

For the full story, go to CloudTweaks.

Emerging Threats In Cyber Security

Businesses today have to deal with a huge variety of threats from the Internet. Even relatively savvy managers may be falling behind as the advent of cloud computing revolutionizes the security needs of online data. As reported by the non-profit Cloud Security Alliance, cloud computing poses several risks that traditional security strategies don’t account for. In particular, the cloud allows for a level of anonymity that attackers can capitalize on in their efforts to avoid detection.

The Cloud Security Alliance announced a competition in which hackers are invited to try and beat the new security software. The results of that competition, which offers a $10,000 top prize, will reveal a lot about the best practices and products in online security. The most common internet attack methods are: eavesdropping (interception of communications by an unauthorised party), trojans (appearing as benign programs, but actually have a malicious purpose), viruses ( self-replication programs that use files to infect and propagate), worms (mass mailing worms or network-awake worms, infecting targets or other computers), phishing, Denial of Service (most commonly used to bring down web sites) and IP Spoofing Attacks.Encrypting your data is essential for protecting sensitive data and preventing data loss due to theft or equipment loss. Use digital certificates to sign all of your sites and implement DLP and auditing.

Read the full article at CloudTweaks.

Advertisement for GlobalDots highlighting website speed,reliability,and availability with a call to action to learn more.

Latest Articles

Complying with AWS’s RI/SP Policy Update: Save More, Stress Less

Shared Reserved Instances (RIs) and Savings Plans (SPs) have been a common workaround for reducing EC2 costs, but their value has always been limited. On average, these shared pools deliver only 25% savings on On-Demand costs—far below the 60% savings achievable with automated reservation tools. For IT and DevOps teams, the trade-offs include added complexity, […]

Itay Tal Head of Cloud Services
21st November, 2024
Three Ways CISOs Can Combat Emerging Threats in 2025

73% of CISOs fear a material cyberattack in the next 12 months, with over three-quarters convinced AI is advancing too quickly for existing methods to combat it. But what can CISOs do to prepare for the coming wave – and access the resources they need to deal with this evolving threat landscape? To find out, […]

11th November, 2024
How Optimizing Kafka Can Save Costs of the Whole System

Kafka is no longer exclusively the domain of high-velocity Big Data use cases. Today, it is utilized on by workloads and companies of all sizes, supporting asynchronous communication between even small groups of microservices.  But this expanded usage has led to problems with cost creep that threaten many companies’ bottom lines. And due to the […]

Itay Tal Head of Cloud Services
29th September, 2024
Migrating Volumez RedHat VMs into Amazon Linux 2 for higher effective discounts rate of Saving Plan

A cloud data infrastructure company relied on extensive use of multiple instance types to test its products. But this made it difficult to optimize costs – a fact which had begun to impact their ability to scale the business.   The GlobalDots team helped the company identify and implement a new infrastructure configuration that both saved […]

Itay Tal Head of Cloud Services
19th September, 2024

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

    GlobalDots' industry expertise proactively addressed structural inefficiencies that would have otherwise hindered our success. Their laser focus is why I would recommend them as a partner to other companies

    Marco Kaiser
    Marco Kaiser

    CTO

    Legal Services

    GlobalDots has helped us to scale up our innovative capabilities, and in significantly improving our service provided to our clients

    Antonio Ostuni
    Antonio Ostuni

    CIO

    IT Services

    It's common for 3rd parties to work with a limited number of vendors - GlobalDots and its multi-vendor approach is different. Thanks to GlobalDots vendors umbrella, the hybrid-cloud migration was exceedingly smooth

    Motti Shpirer
    Motti Shpirer

    VP of Infrastructure & Technology

    Advertising Services