Tim Greene

Author Archives: Tim Greene

IBM says buying Red Hat makes it the biggest in hybrid cloud

In a move that IBM says will make it the world’s leader in hybrid cloud, the company says it’s going to buy open-source giant Red Hat for $34 billion, banking on what it sees as Red Hat’s potential to become the operating system of choice for cloud providers.IBM says it expects growth in the use of cloud services to blossom in the coming years, with enterprises poised to expand from using cloud for inexpensive compute power to placing more applications in the cloud.[ Now see After virtualization and cloud, what's left on premises?] “To accomplish this, businesses need an open, hybrid cloud approach to developing, running and deploying applications in a multi-cloud environment,” IBM says in a written statement.To read this article in full, please click here

IBM says buying Red Hat makes it the biggest in hybrid cloud

In a move that IBM says will make it the world’s leader in hybrid cloud, the company says it’s going to buy open-source giant Red Hat for $34 billion, banking on what it sees as Red Hat’s potential to become the operating system of choice for cloud providers.IBM says it expects growth in the use of cloud services to blossom in the coming years, with enterprises poised to expand from using cloud for inexpensive compute power to placing more applications in the cloud.[ Now see After virtualization and cloud, what's left on premises?] “To accomplish this, businesses need an open, hybrid cloud approach to developing, running and deploying applications in a multi-cloud environment,” IBM says in a written statement.To read this article in full, please click here

Cisco adds new capabilities to its IBN infrastructure

Cisco has advanced its intent-based networking gear so now it can both verify that networks are actually running according to the intentions set by admins and also so it can help to find and resolve network problems faster on both wired and wireless networks.The company says this is a new phase in the evolution of its IBN in which it is addressing assurance – the ability to assess whether the intentions that have been translated into policies and orchestrated throughout the network by configuring individual devices are carrying out the intentions they are supposed to.+DON'T MISS:Getting grounded in intent-based networking; A deep dive into Cisco's intent-based networking; What is intent-based networking?+To read this article in full, please click here

Cisco adds new capabilities to its IBN infrastructure

Cisco has advanced its intent-based networking gear so now it can both verify that networks are actually running according to the intentions set by admins and also so it can help to find and resolve network problems faster on both wired and wireless networks.The company says this is a new phase in the evolution of its IBN in which it is addressing assurance – the ability to assess whether the intentions that have been translated into policies and orchestrated throughout the network by configuring individual devices are carrying out the intentions they are supposed to.+DON'T MISS:Getting grounded in intent-based networking; A deep dive into Cisco's intent-based networking; What is intent-based networking?+To read this article in full, please click here

Cisco adds new capabilities to its IBN infrastructure

Cisco has advanced its intent-based networking gear so now it can both verify that networks are actually running according to the intentions set by admins and also so it can help to find and resolve network problems faster on both wired and wireless networks.The company says this is a new phase in the evolution of its IBN in which it is addressing assurance – the ability to assess whether the intentions that have been translated into policies and orchestrated throughout the network by configuring individual devices are carrying out the intentions they are supposed to.+DON'T MISS:Getting grounded in intent-based networking; A deep dive into Cisco's intent-based networking; What is intent-based networking?+To read this article in full, please click here

Network vulnerability analysis 101: Free online training

If you’re wondering whether your network is vulnerable or not, you haven’t been paying attention – everybody’s is. This free online course shows what it takes to effectively conduct network vulnerability assessments and analysis that will help you keep the hackers at bay.To read this article in full or to leave a comment, please click here(Insider Story)

Network vulnerability analysis 101: Free online training

If you’re wondering whether your network is vulnerable or not, you haven’t been paying attention – everybody’s is. This free online course shows what it takes to effectively conduct network vulnerability assessments and analysis that will help you keep the hackers at bay.To read this article in full or to leave a comment, please click here(Insider Story)

Network vulnerability analysis 101: Free online training

If you’re wondering whether your network is vulnerable or not, you haven’t been paying attention – everybody’s is. This free online course shows what it takes to effectively conduct network vulnerability assessments and analysis that will help you keep the hackers at bay.To read this article in full or to leave a comment, please click here(Insider Story)

Network vulnerability analysis 101: Free online training

If you’re wondering whether your network is vulnerable or not, you haven’t been paying attention – everybody’s is. This free online course shows what it takes to effectively conduct network vulnerability assessments and analysis that will help you keep the hackers at bay.To read this article in full or to leave a comment, please click here(Insider Story)

What to do about WannaCry if you’re infected or if you’re not

Today is likely to be painful for many organizations all over the world that took the weekend off and are returning to the work-week to find hundreds or thousands of computers on their networks encrypted by WannaCry ransomware, which surfaced Friday and has been propagating ever since.Estimates by law enforcement agency Europol estimated yesterday that more than 200,000 computers in 150 countries were infected, but with the worm continuing to spread to vulnerable Windows machines, that number will surely rise.For those whose machines have not been infected, here’s what you need to do right away: Apply the Microsoft patch that will thwart the attack. It’s available here. If you can’t do that because you haven’t tested whether the patch will affect your software build, disable Server Message Block 1 (SMB1) network file sharing. That’s where the flaw is that it attacks. Consider closing firewall port 139, 445 or both because these are the ports SMB uses. Longer term, to guard against similar future attacks you should:To read this article in full or to leave a comment, please click here

What to do about WannaCry if you’re infected or if you’re not

Today is likely to be painful for many organizations all over the world that took the weekend off and are returning to the work-week to find hundreds or thousands of computers on their networks encrypted by WannaCry ransomware, which surfaced Friday and has been propagating ever since.Estimates by law enforcement agency Europol estimated yesterday that more than 200,000 computers in 150 countries were infected, but with the worm continuing to spread to vulnerable Windows machines, that number will surely rise.For those whose machines have not been infected, here’s what you need to do right away: Apply the Microsoft patch that will thwart the attack. It’s available here. If you can’t do that because you haven’t tested whether the patch will affect your software build, disable Server Message Block 1 (SMB1) network file sharing. That’s where the flaw is that it attacks. Consider closing firewall port 139, 445 or both because these are the ports SMB uses. Longer term, to guard against similar future attacks you should:To read this article in full or to leave a comment, please click here

England hospitals hit by coordinated ransomware attack

Hospitals across England have fallen victim to what appears to be a coordinated ransomware attack that has affected facilities diverting patients to hospitals not hit by the malware.The attackers are asking for $300 in Bitcoin to decrypt affected machines, payable within 24 hours or the ransom doubles. If the victims don’t pay within seven days, they lose the option to have the files decrypted, according to U.K. press reports.While multiple healthcare facilities have been hit, the country’s health service says other types of groups have also fallen victim.According to The Register, a spokesperson for the country’s National Health Service’s digital division said: "The investigation is at an early stage but we believe the malware variant is Wanna Decryptor.” The spokesperson said the attack was not specifically targeted at the NHS, but affects organizations across a range of sectors, but didn’t specify which.To read this article in full or to leave a comment, please click here

England hospitals hit by coordinated ransomware attack

Hospitals across England have fallen victim to what appears to be a coordinated ransomware attack that has affected facilities diverting patients to hospitals not hit by the malware.The attackers are asking for $300 in Bitcoin to decrypt affected machines, payable within 24 hours or the ransom doubles. If the victims don’t pay within seven days, they lose the option to have the files decrypted, according to U.K. press reports.While multiple healthcare facilities have been hit, the country’s health service says other types of groups have also fallen victim.According to The Register, a spokesperson for the country’s National Health Service’s digital division said: "The investigation is at an early stage but we believe the malware variant is Wanna Decryptor.” The spokesperson said the attack was not specifically targeted at the NHS, but affects organizations across a range of sectors, but didn’t specify which.To read this article in full or to leave a comment, please click here

Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices

Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks.The Persirai botnet has attacked at least four targets, starting in a predictable pattern, according to researchers at Trend Micro.Persirai takes advantage of a known vulnerability in the cameras to infect them, has them download malware from a command and control server, and then puts them to work either infecting other vulnerable cameras or launching DDoS attacks. “Based on the researchers’ observation, once the victim’s IP Camera received C&C commands, which occurs every 24 hours at 12:00 p.m. UTC, the DDoS attacks start,” the researchers say.To read this article in full or to leave a comment, please click here

Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices

Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks.The Persirai botnet has attacked at least four targets, starting in a predictable pattern, according to researchers at Trend Micro.Persirai takes advantage of a known vulnerability in the cameras to infect them, has them download malware from a command and control server, and then puts them to work either infecting other vulnerable cameras or launching DDoS attacks. “Based on the researchers’ observation, once the victim’s IP Camera received C&C commands, which occurs every 24 hours at 12:00 p.m. UTC, the DDoS attacks start,” the researchers say.To read this article in full or to leave a comment, please click here

Check Point boosts cloud-security education to help IT security pros stay relevant

Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and more resources to public cloud providers. Check Point “We try to explain how to be relevant in the cloud,” says Itai Greenberg, head of cloud security for Check Point.A lot of old-school IT security workers need to learn about how cloud infrastructure works, the terminology used, the interconnections between cloud and corporate owned networks and the ins and outs of APIs, among other skills.To read this article in full or to leave a comment, please click here

Check Point boosts cloud-security education to help IT security pros stay relevant

Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and more resources to public cloud providers. Check Point “We try to explain how to be relevant in the cloud,” says Itai Greenberg, head of cloud security for Check Point.A lot of old-school IT security workers need to learn about how cloud infrastructure works, the terminology used, the interconnections between cloud and corporate owned networks and the ins and outs of APIs, among other skills.To read this article in full or to leave a comment, please click here

Cloud security startup RedLock automates public-cloud protection

Cloud security startup RedLock comes out of stealth mode today with a service that helps defend business resources that reside in pubic clouds, gives customers visibility into how these resources are being used and stores records of that activity for auditing and forensics.+More on Network World: FBI/IC3: Vile $5B business e-mail scam continues to breed+ RedLock Because virtual machines, application instances and workloads change rapidly it’s hard to get a good picture of what’s going on within cloud services such as Amazon Web Services and Microsoft Azure, says RedLock’s CEO Varun Badwhar. “It’s hard to manually monitor and control,” he says.To read this article in full or to leave a comment, please click here

Cloud security startup RedLock automates public-cloud protection

Cloud security startup RedLock comes out of stealth mode today with a service that helps defend business resources that reside in pubic clouds, gives customers visibility into how these resources are being used and stores records of that activity for auditing and forensics.+More on Network World: FBI/IC3: Vile $5B business e-mail scam continues to breed+ RedLock Because virtual machines, application instances and workloads change rapidly it’s hard to get a good picture of what’s going on within cloud services such as Amazon Web Services and Microsoft Azure, says RedLock’s CEO Varun Badwhar. “It’s hard to manually monitor and control,” he says.To read this article in full or to leave a comment, please click here

Fatboy ransomware adjusts demands based on local price of a Big Mac

A new ransomware-for-hire scheme called Fatboy adjusts the ransom it charges based on international exchange rates so it’s more likely the victims get hit for the largest amount they can reasonably pay.Posted on Exploit, a Russian-language online forum, Fatboy automatically adjusts ransom demands according to where the victim is located, according to the Recorded Future blog.That adjustment is based on the Big Mac Index, which was created by The Economist as a way to show whether official international monetary exchange rates line up with the price charged for a certain product – the Big Mac burger sold by McDonald’s – from country to country. The index tells whether currencies are overvalued or undervalued based on what McDonald’s charges in each country.To read this article in full or to leave a comment, please click here

1 2 3 24