Thor Olavsrud

Author Archives: Thor Olavsrud

What is MANRS and does your network have it?

While the internet itself was first envisioned as a way of enabling robust, fault-tolerant communication, the global routing infrastructure that underlies it is relatively fragile. A simple error like the misconfiguration of routing information in one of the 7,000 to 10,000 networks central to global routing can lead to a widespread outage, and deliberate actions, like preventing traffic with spoofed source IP addresses, can lead to distributed denial of service (DDoS) attacks.The Internet Society (ISOC), a cause-driven nonprofit organization that seeks to promote the open development, evolution and use of the Internet and the parent organization of the Internet Engineering Task Force (IETF) standards body, is moving to change that. In 2014, ISOC introduced its Mutually Agreed Norms for Routing Security (MANRS) initiative. Today ISOC announced that the initiative membership has more than quadrupled in its first two years, growing from its initial nine network operators to 42 network operators today.To read this article in full or to leave a comment, please click here

What is MANRS and does your network have it?

While the internet itself was first envisioned as a way of enabling robust, fault-tolerant communication, the global routing infrastructure that underlies it is relatively fragile. A simple error like the misconfiguration of routing information in one of the 7,000 to 10,000 networks central to global routing can lead to a widespread outage, and deliberate actions, like preventing traffic with spoofed source IP addresses, can lead to distributed denial of service (DDoS) attacks.The Internet Society (ISOC), a cause-driven nonprofit organization that seeks to promote the open development, evolution and use of the Internet and the parent organization of the Internet Engineering Task Force (IETF) standards body, is moving to change that. In 2014, ISOC introduced its Mutually Agreed Norms for Routing Security (MANRS) initiative. Today ISOC announced that the initiative membership has more than quadrupled in its first two years, growing from its initial nine network operators to 42 network operators today.To read this article in full or to leave a comment, please click here

IBM invests $200 million in Watson IoT AI business

The venerable 105-year-old IBM may be a global company, but while it has operated important labs and offices overseas, its business units have always been headquartered in the U.S. Until December of last year, that is, when it opened the new global headquarters for the IBM Watson Internet of Things (IoT) unit in Munich, Germany. Now, faced with dramatically increasing global demand for Watson IoT solutions and services, Big Blue is doubling down on that investment.On Tuesday, IBM announced a $200 million investment in the Watson IoT headquarters, marking one of the company's largest investments in Europe in its history. The investment is part of the $3 billion IBM has earmarked to bring Watson cognitive computing to IoT. IBM says the move is a response to escalating demand from customers who are looking to transform their operations using a combination of IoT and artificial intelligence technologies.To read this article in full or to leave a comment, please click here

How to protect your mission-critical information

Given the vast and increasing volumes of data within organizations today, securing your data can seem an insurmountable task. But you can get your arms around it if you assess the value of your data and focus your attention on protecting your mission-critical information assets — the crown jewels.Yesterday, the nonprofit Information Security Forum (ISF) announced the availability of Protecting the Crown Jewels: How to Secure Mission-Critical Information Assets, the latest in a series of reports geared to helping organizations do just that."Businesses must prioritize the protection of mission-critical information assets," says Steve Durbin, managing director of the ISF. "Far too often, organizations consider the value of these assets, but fail to recognize the extent to which they are exposed to global security threats."To read this article in full or to leave a comment, please click here

DataRobot aims to help create data science executives

Data scientists are in short supply. But so too are managers that understand data science and machine learning enough to spot the opportunities for using these disciplines to optimize their businesses.McKinsey Global Institute has projected that by 2018, the U.S. alone will face a shortage of 1.5 million managers and analysts with the necessary analytics and data science expertise to fill demand.The business side of machine learning To combat this problem, Data science automation specialist DataRobot announced today that it has updated its DataRobot University curriculum with Data Science for Executives, a half-day offering that teaches executives interested in the benefits of advanced data science how to identify opportunities to optimize their business using machine learning.To read this article in full or to leave a comment, please click here

Security an afterthought in connected home, wearable devices

Based on an extensive review of publicly reported internet of things (IoT) device vulnerabilities, the Online Trust Alliance (OTA) today announced that all of the problems could have been easily avoided. "In this rush to bring connected devices to market, security and privacy is often being overlooked," Craig Spiezle, executive director and president of the OTA, said in a statement today. "If businesses do not make a systematic change, we risk seeing the weaponization of these devices and an erosion of consumer confidence impacting the IoT industry on a whole due to their security and privacy shortcomings."To read this article in full or to leave a comment, please click here

Security an afterthought in connected home, wearable devices

Based on an extensive review of publicly reported internet of things (IoT) device vulnerabilities, the Online Trust Alliance (OTA) today announced that all of the problems could have been easily avoided. "In this rush to bring connected devices to market, security and privacy is often being overlooked," Craig Spiezle, executive director and president of the OTA, said in a statement today. "If businesses do not make a systematic change, we risk seeing the weaponization of these devices and an erosion of consumer confidence impacting the IoT industry on a whole due to their security and privacy shortcomings."To read this article in full or to leave a comment, please click here

How blockchain will disrupt your business

Like mobile and cloud, blockchain — first implemented in the original source code of bitcoin in 2009 — stands poised to profoundly disrupt business. If it lives up to its promise, it won't just be financial institutions that are disrupted."If you can transfer money or something of value through the internet just like another form of data, what else can you do with it? It provides a way to establish trust in the digital world," says Angus Champion de Crespigny, Financial Services Blockchain and Distributed Infrastructure Strategy Leader, Ernst & Young. "How do you ensure something is the original copy of something on the internet? Prior to blockchain technology, you couldn't."To read this article in full or to leave a comment, please click here

SAP builds next-gen data warehouse for the cloud

With an eye on the need for more scalable, real-time analytics, SAP today unveiled SAP BW/4HANA, its next-generation data warehouse product for the real-time digital enterprise.BW/4HANA will support on-premises deployments, but will also be available on Amazon Web Services (AWS) and SAP HANA Enterprise Cloud (HEC), says Neil McGovern, senior director, Product Marketing, SAP Data Warehousing."We're trying to give our customers some options," he says. "AWS is infrastructure as a service (IaaS) — you can provision very quickly and inexpensively. With HEC, it's far more of a complete, turnkey solution — more platform as a service (PaaS)." SAP’s next-generation data warehouse service, SAP BW/4HANA, provides interactivity with historical and live data whether that data lives inside or outside the enterprise. (Click for larger image.)To read this article in full or to leave a comment, please click here

5 security practices hackers say make their lives harder

Whether they identify as white hats, black hats or something in-between, a majority of hackers agree that no password is safe from them — or the government for that matter. Regardless of where they sit with respect to the law, hackers mostly agree that five key security measures can make it a lot harder to penetrate enterprise networks.At the Black Hat USA 2016 conference in Las Vegas earlier this month, Thycotic, a specialist in privileged account management (PAM) solutions, surveyed more than 250 attendees who self-identified as hackers (respondents remained anonymous). Eighty-four percent of respondents identified as white hat hackers — security researchers that help organizations uncover and remediate vulnerabilities. And 15 percent identified as black hat hackers, who penetrate networks with criminal intent.To read this article in full or to leave a comment, please click here

5 security practices hackers say make their lives harder

Whether they identify as white hats, black hats or something in-between, a majority of hackers agree that no password is safe from them — or the government for that matter. Regardless of where they sit with respect to the law, hackers mostly agree that five key security measures can make it a lot harder to penetrate enterprise networks.At the Black Hat USA 2016 conference in Las Vegas earlier this month, Thycotic, a specialist in privileged account management (PAM) solutions, surveyed more than 250 attendees who self-identified as hackers (respondents remained anonymous). Eighty-four percent of respondents identified as white hat hackers — security researchers that help organizations uncover and remediate vulnerabilities. And 15 percent identified as black hat hackers, who penetrate networks with criminal intent.To read this article in full or to leave a comment, please click here

How Adobe uses machine learning to drive marketing success

Earlier this year, Adobe took the wraps off its new Adobe Marketing Cloud, touting new data science capabilities like Adobe Analytics' Segment IQ, which uses machine learning to help marketers gain deep insight into audience segments. On Wednesday, Adobe advanced Segment IQ another step with the release of Segment Comparison for Analysis Workspace.Segment Comparison for Analysis Workspace is the first in what Adobe promises will be a series of audience analysis and discovery tools within Segment IQ. It uses machine learning techniques to perform automated analysis on every metric and dimension to which you have access. Nate Smith, senior product marketing manager, Adobe Analytics, says this allows Segment Comparison to uncover the key characteristics of the audience segments that are driving your company's KPIs.To read this article in full or to leave a comment, please click here

Laptops most often stolen from most unlikely place

The rise of mobile in the enterprise has led many CIOs to become concerned about the potential for data loss due to a lost or stolen device — phones, laptops and the like lost in taxis, restaurants and hotel rooms. But a new study has found that CIOs also need to spend more time focusing on the office itself.In July of this year, Kensington, a supplier of desktop and mobile device accessories (including laptop locks), surveyed 300 U.S. IT professionals from a range of industries for its IT Security & Laptop Theft report.To read this article in full or to leave a comment, please click here

Laptops most often stolen from most unlikely place

The rise of mobile in the enterprise has led many CIOs to become concerned about the potential for data loss due to a lost or stolen device — phones, laptops and the like lost in taxis, restaurants and hotel rooms. But a new study has found that CIOs also need to spend more time focusing on the office itself.In July of this year, Kensington, a supplier of desktop and mobile device accessories (including laptop locks), surveyed 300 U.S. IT professionals from a range of industries for its IT Security & Laptop Theft report.To read this article in full or to leave a comment, please click here

Open source R extension simplifies data science with IBM Watson

With the release of CognizeR, an open source extension for the statistical computing-focused R programming language, Columbus Collaboratory is aiming to simplify data science with IBM Watson."Our goal was to connect data scientists everywhere with cognitive computing in a software environment they already know and love: R," Ty Henkaline, chief analytics innovator at Columbus Collaboratory, said in a statement yesterday. "CognizeR now shortens the journey toward building real cognitive solutions by providing quick and easy access to Watson services. Releasing this code to the open source community advances our mission of delivering accelerated business value to our member companies and beyond."To read this article in full or to leave a comment, please click here

8 tips to get more bang for your big data convergence bucks

How technology convergence can help CIOs do more with lessImage by ThinkstockCIOs and other IT decision-makers are used to having to do more with less. In the world of big data, they may be able to achieve orders-of-magnitude cost savings and productivity gains due to the convergence of development, IT ops and business intelligence (BI) strategy, exploiting advancements in open source software, distributed computing, cloud economics and microservices development.To read this article in full or to leave a comment, please click here

Businesses failing to secure privileged accounts

Most companies fail to secure the "keys to the kingdom," according to a new benchmark survey .Last week, privileged account management (PAM) specialist Thycotic and research firm Cybersecurity Ventures released their 2016 State of Privileged Account Management security report, based on the responses of more than 500 IT security professionals who have participated in the Privileged Password Vulnerability Benchmark survey to date.High priority, low compliance While 80 percent of respondents indicated PAM security is a high priority for their organizations, and 60 percent said PAM security is required to demonstrate compliance with government regulations, 52 percent of participants received a failing grade on enforcement of proper privileged credential controls.To read this article in full or to leave a comment, please click here

Businesses failing to secure privileged accounts

Most companies fail to secure the "keys to the kingdom," according to a new benchmark survey .Last week, privileged account management (PAM) specialist Thycotic and research firm Cybersecurity Ventures released their 2016 State of Privileged Account Management security report, based on the responses of more than 500 IT security professionals who have participated in the Privileged Password Vulnerability Benchmark survey to date.High priority, low compliance While 80 percent of respondents indicated PAM security is a high priority for their organizations, and 60 percent said PAM security is required to demonstrate compliance with government regulations, 52 percent of participants received a failing grade on enforcement of proper privileged credential controls.To read this article in full or to leave a comment, please click here

AI expanding in the enterprise (whether or not you know it)

Artificial intelligence (AI) technologies are already proliferating in the enterprise. However, many business leaders don't realize they're leveraging technologies that rely on AI, according to a new study by natural language generation (NLG) specialist Narrative Science. Despite the confusion, adoption is imminent. Stuart Frankel, CEO and co-founder of Narrative Science. "AI has been around for a long time," says Stuart Frankel, CEO and co-founder of Narrative Science. "While it is super-hot and very buzzy today, there are still some success stories of AI that we just don't consider AI anymore. We use it every day and we're used to it. I think that's a natural progression. Once that esoteric technology that's sort of hard to explain gets wide adoption, it's no longer AI anymore."To read this article in full or to leave a comment, please click here

Security teams consulted too late on digital transformation

IT decision-makers who have responsibility for security believe security teams are brought in too late to have a meaningful effect on digital transformation initiatives, according to a new study. Dimensional Research, commissioned by by Dell, recently surveyed 631 IT decision-makers with responsibility for security from companies with 1,000 or more employees in the U.S., U.K., Germany, Australia, Scandinavia and the Benelux region. Ninety-seven percent of respondents report their organizations were investing in digital technologies to transform their business: 72 percent of the respondents said their organizations had active projects in mobile, 68 percent in cloud and 37 percent involving the Internet of Things (IoT) — all areas commonly associated with digital transformation.To read this article in full or to leave a comment, please click here