WEDNESDAY, SEPTEMBER 25, 2019, 11 AM – NOON ET Webinar featuring Guest Speaker Jason Bloomberg, Leading IT Analyst and Digital Transformation Expert, Intellyx Legacy modernization…
The phrase ‘black hat’ refers to a hacker with criminal intentions, so I expected my first trip to the Black Hat USA conference held in…
By Jason Bloomberg A mere half a lifetime ago, applications were simply computer programs, running in one place at a time. Client/server architecture soon distributed…
“Zero-trust” is a security model that requires strict access controls, not trusting anything by default for any person, application, or service—even if it resides inside a…
Cloud-native computing is perhaps the most important trend in enterprise IT today. At its core, cloud-native extends the benefits of cloud computing to the entire…
An Intellyx Brain Candy Brief Cyxtera is a colocation provider that was at Black Hat touting AppGate SDP, its zero-trust network security platform. AppGate SDP…
An Intellyx Brain Candy Brief Vectra captures and normalizes network metadata at scale and enriches them with machine learning-derived security information. It then uses this…
An Intellyx Brain Candy Brief Researchers, administrators, government agencies, and security personnel uncover malicious online behavior on a continual basis, in the form of URLs,…
As the complexity of modern IT continues to explode with no limits in sight, organizations are increasingly leveraging cloud-native computing to bring the best practices…
There’s an old IT joke that the definition of ‘legacy’ is ‘anything that works.’ The applications running on the venerable IBM i midrange operating system…


