Carbon Monoxide is odorless, tasteless and invisible, and it accounts for over 72,000 cases of poisoning each year. Kidde calls their C3010D model "worry free" because its sensor and sealed battery provide 10 years of uninterrupted CO detection, and a digital display that updates every 15 seconds. The unit will chirp when its reaching the ends of its life, so you don't have to wonder. The Kidde C3010D alarm is currently discounted 32% to $34.91. See this deal now on Amazon.To read this article in full, please click here
Managing networks has become increasingly complex, and it will remain a challenge as the use of Internet of Things devices continues to grow. This complexity makes it difficult to reconfigure a traditional network in a timely manner to respond to malicious events or fix configuration errors.A software-defined network (SDN) can help by giving network engineers the flexibility to dynamically change the behavior of a network on a node-by-node basis — something not typically available in a traditional network. An SDN uses virtualization to simplify the management of network resources and offers a solution for increased capacity without significantly increasing costs.To read this article in full, please click here
It’s no secret that the rise of the Internet of Things (IoT) presents massive new security challenges. Heck, I’ve written about the issue here more than once. But one company claims that enterprise IoT also shows promise for addressing key security issues.Also on Network World: Is the U.S. finally about to take IoT security seriously? and The time to deal with IoT security is now
Tim Lang, CTO at BI and data analytics firm MicroStrategy, notes that 70 percent of security breaches come from the inside, and he says Enterprise Internet of Things (EIoT) can help enterprises “monitor and prevent these breaches before they happen.” To read this article in full, please click here
NordVPN promises a private and fast path through the public internet, with no logs and unmetered access for 6 simultaneous devices. They are currently running a holiday promotion, but you'll have to use this link to find it. Its typical price has been discounted to $99 for 3 years of service. That's a good deal at just $2.75 per month. See the $2.75/month NordVPN holiday deal here.
To read this article in full, please click here
In most cases, I try to turn a skeptical eye on hyperbole. So when a cybersecurity expert tells me that IoT security is a “ticking time bomb,” my initial reaction is not to worry about an upcoming “security apocalypse.”But I am already worried about security in the Internet of Things. So, I took the opportunity to ask Srini Vemula, global product management leader and security expert at SenecaGlobal, what’s really at risk as we hurtle toward 2020 and an estimated 20.4 billion connected devices.To read this article in full, please click here
An APC UPS provides backup power power and surge protection to power and protect your PC or Mac, network router, gaming consoles like Xbox and PS4, AV and other business electronics from the dangers of power surges, spikes, lightning and power outages. By powering your critical electronics with a backup battery during blackouts, you ensure personal and professional connectivity when it matters most. Improvements in efficiency, size and surge protection come at an affordable price, making the Back-UPS Pro mini-tower battery backup UPS models a perfect solution for your power protection needs. Right now the Back-UPS Pro from APC averages 4.7 out of 5 stars on Amazon, where its typical list price of $170 is discounted 30% to $119. See this deal now on Amazon.To read this article in full, please click here
Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.
The reality for security teams today is that they are facing challenges on multiple fronts. The number of security breaches is increasing, which means the number of security alerts to be examined each day is increasing. The attacks are becoming more sophisticated and multi-dimensional. The number of cybersecurity solutions available continues to grow, which requires time and effort to understand. The amount of data in the network is snowballing, which means the cybersecurity infrastructure needs to be constantly updated to keep up. What’s worse is that all this is happening in the midst of new networking paradigms related to cloud, virtualization and software-defined data centers.To read this article in full, please click here
Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.
The Internet of Things (IoT) era has finally arrived, and businesses need to be prepared for a world where everything is connected.I’m an analyst so I’ll support my proclamation that IoT is here with data: There are currently 25 billion internet-connected devices, and that will double by 2020 and then grow to 80 billion by 2025. ZK Research
However, there’s a more basic way of understanding where we are in the adoption cycle: IoT has become the norm, not the exception, according to companies I talk to. IT and business leader no longer look at me like I have three eyes when I say, “IoT.” In fact, in many conversations with them, the term IoT never comes up — yet they are connecting things. Companies are connecting more things because it makes their businesses run better, and over the next decade, this trend will accelerate.To read this article in full, please click here
Our tech panel looks at how Uber (secretly) handled last year's hack and the controversy around Google's decision to track Android users' locations. Then it's time to discuss why AWS is selling off hardware in China and what Mozilla is up to with its new Firefox Quantum.
With everything from massive data breaches at global organizations to explosive ransomware attacks that infect hundreds of thousands of users within days, it’s well established that enterprises these days are dealing with more threats than ever before – all of which are increasing in abundance, frequency and complexity.Among other things, this rapidly evolving threat environment can be attributed to new and expanding threat vectors that have opened the door for external threats to reach critical business assets via non-corporate entities, whether through a consumer device, poorly secured partner network or branch office. The Internet of Things (IoT) and guest tenant services, for example, force a unique method of segmenting the traffic service/workloads and introduce a level of operational complexity.To read this article in full, please click here
A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.
The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.
Doctors — particularly the ones that work in emergency rooms — need to have strong stomachs and level heads, since they see illness and injury at their most serious. Violence, accidents and serious diseases are all a matter of routine in the ER.Dr. Christian Dameff is a faculty member at UC San Diego’s medical school, has seen all of that and more, since he’s also a white-hat hacker and expert in medical IoT security. He warned the audience on Thursday at the Security of Things USA convention in San Diego that the state of that security is, frankly, alarming.+ALSO ON NETWORK WORLD: Windows Server in the cloud: Can you, should you, and with which provider? + HPE gives up the battle for tier 1 data center customersTo read this article in full, please click here
With August Smart Lock Pro, you can lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone. The 24/7 activity log means you’re always in the know. With your phone in your pocket, simply open the door and you’re in your home. Heading out? August Smart Lock Pro will also automatically lock the door behind you after you leave. The smart lock currently averages 4 out of 5 stars on Amazon, where the list price on the Lock and Connect Bundle has been reduced 11% to $249.99. See this deal on Amazon.To read this article in full, please click here
What’s in store for the Internet of Things (IoT) in 2018? That’s the question on many people’s minds in the fast-growing IoT industry. One set of answers can be found in a new report from Forrester, called Predictions 2018: IoT Moves From Experimentation To Business Scale. According to Forrester and published reports last week, that journey means many things, but apart from the usual superheated speculation about IoT’s incredible growth and increasing impact, here’s what I think is most interesting. To read this article in full, please click here
Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.
Firewalls have become ubiquitous across enterprises over the past decade, but the combination of new and varied access methods combined with increasingly sophisticated attacks has forced network operators and security professionals to constantly evaluate their defenses. Typically, firewalls are on a five-year refresh cycle, according to Gartner researcher Adam Hils, and that gives organizations the opportunity to evaluate fairly regularly what type of firewall and what features best suit their needs.+MORE AT NETWORK WORLD: What is a firewall? +To read this article in full or to leave a comment, please click here