Benefits of distributed resiliency
Resiliency and redundancy is changing to be at the IT level
Resiliency and redundancy is changing to be at the IT level
With over a quarter of data centers having recently suffered a prolonged outage, something needs to change
Eliminating the risks of centralized data configurations with a shared chain
Only physical drive destruction will offer definitive data security
Hope for the best, prepare for the worst
Singapore will place requirements on critical infrastructure players. That’s an opportunity for the industry to provide managed security services
The causes of data center downtime are diverse, but there is an important trend that puts the ultimate responsibility on generators
Now we are placing IT equipment at the edge of the network, we have to apply new security measures… and keep up the existing ones
The champagne is still flowing, but some people are drinking for different reasons
The biggest lesson from the meltdown at British Airways is this: don’t have a single point of failure
IoT and the Internet of Me: how digital infrastructure rewired the millennial mindset
An internal arc fault is rare, but it is the most severe fault that can occur within a switchgear system
The airline could win back some trust if it helped to break the secrecy around IT failures
Our latest on the BA outage is here
An essential but complex guide to lightning protection for data centers
All you need to know about the forthcoming EU Data Protection Regulation (GDPR)
You can’t protect infrastructure from sharp teeth and long claws
2016 saw an epidemic of catastrophic failure. Here are some lessons to learn from the tough experiences of others
In the wake of the attack on Dyn, we need a new model for outsourcing security
Data sovereignty issues will be at the fore, and data could be repatriated during the Brexit process
This year is already seeing unplanned outages. Plan for the unexpected now!
Politics will make us all more conscious of where our data is, while hyperconvergence, SDN and the cloud come of age
What’s so different about attacks on universities?
Security by obscurity doesn’t even work in code, so how do you expect to hide a data center?
The new threat from the Internet of Things will need swift response