John Deere is taking the Internet of Things out into the field by developing new technologies and embracing existing ones to boost the efficiency of prepping, planting, feeding and harvesting with the goal of improving per-acre crop yields.+More on Network World: 10 Internet of Things companies to watch+
Ron ZinkTo read this article in full or to leave a comment, please click here
The Department of Homeland Security has issued an alert about a 6-year-old SAP vulnerability that’s still being exploited enough that DHS deems it worthy of special note.But the responsibility for being vulnerable lies with SAP users. “This is a responsibility that falls on SAP customers' information security teams, service providers and external audit firms,” according to an FAQ about the vulnerability that was put out by Onapsis, an SAP-security vendor.And the company is right. The fixes should have been applied by now, since SAP has issued them. SAP issued the following statement about the patches:To read this article in full or to leave a comment, please click here
The Department of Homeland Security has issued an alert about a 6-year-old SAP vulnerability that’s still being exploited enough that DHS deems it worthy of special note.But the responsibility for being vulnerable lies with SAP users. “This is a responsibility that falls on SAP customers' information security teams, service providers and external audit firms,” according to an FAQ about the vulnerability that was put out by Onapsis, an SAP-security vendor.And the company is right. The fixes should have been applied by now, since SAP has issued them. SAP issued the following statement about the patches:To read this article in full or to leave a comment, please click here
When the ransomware demands come in it’s really too late to come up with a good response plan, so do that as soon as you can, an Interop audience was told.“You need to decide beforehand whether you will pay and under what circumstances,” John Pironti, president of IP Architects, says. “It’s a cost benefit decision in the end.”+More on Network World: FBI: Ransomware threat at all-time high; how to protect company jewels | See all the stories from Interop +To read this article in full or to leave a comment, please click here
When the ransomware demands come in it’s really too late to come up with a good response plan, so do that as soon as you can, an Interop audience was told.“You need to decide beforehand whether you will pay and under what circumstances,” John Pironti, president of IP Architects, says. “It’s a cost benefit decision in the end.”+More on Network World: FBI: Ransomware threat at all-time high; how to protect company jewels | See all the stories from Interop +To read this article in full or to leave a comment, please click here
LAS VEGAS -- Cyber insurance can pay out millions of dollars to cover the cost of data breach liability, but buying the policies can be a nightmare for info security pros, and premiums for similar coverage can vary wildly, an Interop audience was told.
On the flip side, the insurance companies lack underwriters with IT knowledge, a good model for assessing risk, a common vocabulary to discuss policies clearly, and face a looming threat that a single successful attack of just the wrong kind could mean a major financial hit, says Dave Bradford, co-founder and chief strategy officer at Advisens.To read this article in full or to leave a comment, please click here
LAS VEGAS -- Cyber insurance can pay out millions of dollars to cover the cost of data breach liability, but buying the policies can be a nightmare for info security pros, and premiums for similar coverage can vary wildly, an Interop audience was told.
On the flip side, the insurance companies lack underwriters with IT knowledge, a good model for assessing risk, a common vocabulary to discuss policies clearly, and face a looming threat that a single successful attack of just the wrong kind could mean a major financial hit, says Dave Bradford, co-founder and chief strategy officer at Advisens.To read this article in full or to leave a comment, please click here
LAS VEGAS -- Visibility is key to troubleshooting network woes, but getting such access can be expensive. To help out, a veteran networking pro shared with attendees of the Interop conference in Las Vegas his list of a dozen mostly free “killer” tools.
Network Protocol Specialists owner Mike Pennacchi: Free tools can be customized to fit your needs
“There are commercial tools that do most of these functions,” says Mike Pennacchi, owner and lead network analyst at Network Protocol Specialists. “If you don’t have any budget, this gives you the tools without spending a lot of money.”To read this article in full or to leave a comment, please click here
LAS VEGAS -- Visibility is key to troubleshooting network woes, but getting such access can be expensive. To help out, a veteran networking pro shared with attendees of the Interop conference in Las Vegas his list of a dozen mostly free “killer” tools.
Network Protocol Specialists owner Mike Pennacchi: Free tools can be customized to fit your needs
“There are commercial tools that do most of these functions,” says Mike Pennacchi, owner and lead network analyst at Network Protocol Specialists. “If you don’t have any budget, this gives you the tools without spending a lot of money.”To read this article in full or to leave a comment, please click here
Terrorists are developing and distributing encryption tools that protect privacy of their communications, as well as other homegrown apps that include a news-feed compiler and DDoS attack software, according to a Trend Micro report.The tools have been made to give less tech-savvy members of terror groups the ability to use known technologies without having to trust or invest in commercial products that can perform the same functions, the report says.Some of the tools are still being updated, indicating an active development community among the terrorists.To read this article in full or to leave a comment, please click here
Terrorists are developing and distributing encryption tools that protect privacy of their communications, as well as other homegrown apps that include a news-feed compiler and DDoS attack software, according to a Trend Micro report.The tools have been made to give less tech-savvy members of terror groups the ability to use known technologies without having to trust or invest in commercial products that can perform the same functions, the report says.Some of the tools are still being updated, indicating an active development community among the terrorists.To read this article in full or to leave a comment, please click here
Interop 2016The 30th version running this week in Las Vegas features a trade show with more than 160 vendors displaying their wares and where its interoperability mission ventures far outside the show’s signature InteropNet Demo Lab. This year it is focused on promoting interoperability among Internet of Things devices, a category of gear unheard of that first year. (See Network World's preview story of the show.)To read this article in full or to leave a comment, please click here
Interop 2016The 30th version running this week in Las Vegas features a trade show with more than 160 vendors displaying their wares and where its interoperability mission ventures far outside the show’s signature InteropNet Demo Lab. This year it is focused on promoting interoperability among Internet of Things devices, a category of gear unheard of that first year. (See Network World's preview story of the show.)To read this article in full or to leave a comment, please click here
The Interop conference convening this week will be a far cry from the gathering of a small group of technology pioneers who sought interoperability among Internet devices 30 years ago.Then, the 1986 invitation-only TCP/IP Interoperability Conference drew representatives from 65 tech companies.The 30th version running this week in Las Vegas features a trade show with more than 160 vendors displaying their wares and where its interoperability mission ventures far outside the show’s signature InteropNet Demo Lab. This year it is focused on promoting interoperability among Internet of Things devices, a category of gear unheard of that first year.To read this article in full or to leave a comment, please click here
The Interop conference convening this week will be a far cry from the gathering of a small group of technology pioneers who sought interoperability among Internet devices 30 years ago.Then, the 1986 invitation-only TCP/IP Interoperability Conference drew representatives from 65 tech companies.The 30th version running this week in Las Vegas features a trade show with more than 160 vendors displaying their wares and where its interoperability mission ventures far outside the show’s signature InteropNet Demo Lab. This year it is focused on promoting interoperability among Internet of Things devices, a category of gear unheard of that first year.To read this article in full or to leave a comment, please click here
Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit.The goals of the offensive are to disrupt communications within ISIS and between the group and potential recruits, according to a story in the New York Times.To meet those goals, U.S. Cyber Command could use such means as DDoS and man-in-the-middle attacks, banking Trojans and even ransomware-type attacks that irreversibly encrypt machines (but skip the ransom), experts say.To read this article in full or to leave a comment, please click here
Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit.The goals of the offensive are to disrupt communications within ISIS and between the group and potential recruits, according to a story in the New York Times.To meet those goals, U.S. Cyber Command could use such means as DDoS and man-in-the-middle attacks, banking Trojans and even ransomware-type attacks that irreversibly encrypt machines (but skip the ransom), experts say.To read this article in full or to leave a comment, please click here
Fortinet is embarking on a mission for some of its firewalls and other products and those of third-party vendors to work together to boost security across core networks, remote devices and the cloud.Called Fortinet Security Fabric, the architecture relies on direct communications inherent among certain of its own products (such as the FortiGate next-generation firewall, FortiWeb Web application firewall, FortiMail email security and FortiSandbox advanced threat protection system) as well as with those of other vendors via APIs.Each third-party device can participate in sharing information depending on the capabilities of its API, says John Maddison, Fortinet’s senior vice president of products and solutions.To read this article in full or to leave a comment, please click here
Palo Alto Networks is on board with industry-wide efforts to share threat intelligence and disseminate it so the collective knowledge businesses gather about threats can be quickly turned into defenses against new types of attacks.Its efforts include support for the new federal Cybersecurity Information Sharing Act that lifts some of the liability businesses are exposed to if they share data about security incidents. If the data inadvertently reveals personal information but was submitted in accordance with the law, the contributor would not be legally liable.The company is also hammering out the details of the Cyber Threat Alliance it formed last year to gather threat information from security vendors and researchers that can rapidly and thoroughly unmask current threats. The goal is to shorten the useful lives of attacks and put a heavier burden on attackers who want to stay in business.To read this article in full or to leave a comment, please click here
Palo Alto Networks is on board with industry-wide efforts to share threat intelligence and disseminate it so the collective knowledge businesses gather about threats can be quickly turned into defenses against new types of attacks.Its efforts include support for the new federal Cybersecurity Information Sharing Act that lifts some of the liability businesses are exposed to if they share data about security incidents. If the data inadvertently reveals personal information but was submitted in accordance with the law, the contributor would not be legally liable.The company is also hammering out the details of the Cyber Threat Alliance it formed last year to gather threat information from security vendors and researchers that can rapidly and thoroughly unmask current threats. The goal is to shorten the useful lives of attacks and put a heavier burden on attackers who want to stay in business.To read this article in full or to leave a comment, please click here