Businesses large and small are under the gun to satisfy network access for varied constituencies: not only centralized and remote workers, but outsiders ranging from consumers to partners. Typically, that means supporting multiple access technologies such as a secure virtual private network (VPN) and any number of Wi-Fi guest access devices.Businesses typically have spent years trying to catch up with the access needs of their workers. Larger firms may use a variety of networking technologies from high-performing carrier-based Multiprotocol Label Switching (MPLS) virtual private networks (VPNs), campus or metro Ethernet local area networks (LANs), and public internet VPNs. Smaller organizations are more likely inclined to the public internet options.To read this article in full or to leave a comment, please click here
The military knows how to operate in chaotic situations.Where should resources be deployed? How should isolated platoons be managed? How should field units and central command coordinate activities when communication lines are broken? How can communications be secured? How can systems be made more resilient? Many military techniques can be adpated to enhance IoT resiliency.Lessons from the Art of War
Military communications or “comms" are activities, equipment and tactics the military uses on the battlefield. They include measurement systems, cryptography and robust communication channels. Military doctrine combines centralized intent with decentralized execution. Four key design principles are applied:To read this article in full or to leave a comment, please click here
When I started focusing on the security market 14 years ago, the SIEM market was burgeoning market populated by vendors such as CA, e-Security, Intellitactics, and NetForensics. In the intervening timeframe, the SIEM market has grown, thrived, and changed every few years. SIEM started as a central repository for event correlation for perimeter security devices. It then morphed into a reporting engine for governance and compliance. In a subsequent phase, SIEM became more of a query and log management tools for security analysts. Fast forward to 2016 and SIEM has taken on a much bigger scope – an enterprise software platform that anchors security operations centers (SOCs). In this role, SIEM platforms can also include:To read this article in full or to leave a comment, please click here
When I started focusing on the security market 14 years ago, the security information and event management (SIEM) market was a burgeoning market populated by vendors such as CA, e-Security, Intellitactics and NetForensics. In the intervening timeframe, the SIEM market has grown, thrived and changed every few years. SIEM started as a central repository for event correlation for perimeter security devices. It then morphed into a reporting engine for governance and compliance. In a subsequent phase, SIEM became more of a query and log management tool for security analysts. Fast forward to 2016, and SIEM has taken on a much bigger scope—an enterprise software platform that anchors security operations centers (SOCs). In this role, SIEM platforms can also include:To read this article in full or to leave a comment, please click here
Tesla Motors is considered one of the most cybersecurity-conscious car manufacturers in the world -- among other things, it has a bug bounty program. But that doesn't mean the software in its cars is free of security flaws.Researchers from Chinese technology company Tencent found a series of vulnerabilities that, when combined, allowed them to remotely take over a Tesla Model S car and control its sunroof, central display, door locks and even the breaking system. The attack allowed the researchers to access the car’s controller area network (CAN) bus, which lets the vehicle’s specialized computers communicate with each other."As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars," the researchers from Tencent's Keen Security Lab said in a blog post Monday. "We have verified the attack vector on multiple varieties of Tesla Model S. It is reasonable to assume that other Tesla models are affected."To read this article in full or to leave a comment, please click here
If you’re in the Wi-Fi network installation business in Europe, you might be about to get extremely busy. The head of the politico-economic union said its member states will be investing dramatically in Wi-Fi connectivity. The reason: to “empower” its subjects.“Every European village and every city” will be equipped with a total of an equivalent of 134 million dollars-worth of non-payment, free wireless Internet by 2020.” The installs will occur around the “main centers of public life,” Jean-Claude Juncker, president of the European Union’s executive body, said in a state of the union address a few days ago.To read this article in full or to leave a comment, please click here
Jyväskylä, Finland -- The 11th European Conference on Innovation and Entrepreneurship was held last week at this picturesque university town in the central Finnish “Lake District.”Stanford University’s Henry Etzkovitz gave the opening keynote on “Triple Helix Innovation in a Crisis.”Etzkovitz originated the concept of “Triple Helix,” for the combined efforts of government, industry, and academia in regional economic development. He declared that in the knowledge era, the academic strand of the helix is the critical component.Cities and regions who deploy their academic resources wisely will prosper most in an era of global economic turmoil. “The entrepreneurial university” in particular can drive innovation because of its continuous waves of students, who can work on faculty-directed projects that do not have to meet direct economic goals, as corporations do.To read this article in full or to leave a comment, please click here
If you believe the reviewers on Amazon, you may not find a better sounding pair of earbuds at this price point, which at the current 59% discount is just $11.99. The ErgoFit earbuds from Panasonic are designed to fit comfortably and securely in your ear, isolating outside noise while delivering great sound with a wider frequency range than most comparable buds. The earbuds come in various colors and features a generous 3.6 ft. cord that easily fits through or around your clothes, coats and bags. The ErgoFit earbuds average 4.5 stars from nearly 36,000 people on Amazon (read reviews) which lends some credibility to Panasonic's claim that the earbuds deliver dynamic, crystal clear sound while successfully blocking ambient noise. Its typical list price of $29 has been reduced 59% to just $11.99.To read this article in full or to leave a comment, please click here
If you believe the reviewers on Amazon, you may not find a better sounding pair of earbuds at this price point, which at the current 61% discount is just $11.24. The ErgoFit earbuds from Panasonic are designed to fit comfortably and securely in your ear, isolating outside noise while delivering great sound with a wider frequency range than most comparable buds. The earbuds come in various colors and features a generous 3.6 ft. cord that easily fits through or around your clothes, coats and bags. The ErgoFit earbuds average 4.5 stars from nearly 36,000 people on Amazon (read reviews) which lends some credibility to Panasonic's claim that the earbuds deliver dynamic, crystal clear sound while successfully blocking ambient noise. Its typical list price of $29 has been reduced 61% to just $11.24.To read this article in full or to leave a comment, please click here
With the release of the iPhone 7, I was hoping to get a bargain on the iPhone 6 Plus. There was nothing in the 6S that appealed to me, and the 6 would be cheaper. So, I checked out the iPhone offerings on Glyde, where I have done business before to my satisfaction. As of last Wednesday, an iPhone 6 Plus, 16GB, on AT&T was $374. I decided to wait for a price drop. Two days later, the price fell remarkably to $311. Well, that's going in the right direction. I decided to wait for more changes. The next day, last Saturday, the price spiked to $455. That's definitely going in the wrong direction.To read this article in full or to leave a comment, please click here
Chinese researchers from Keen Security Lab of Tencent announced that they could chain multiple vulnerabilities together which allowed them to remotely hack the Tesla Model S P85 and 75D from as far as 12 miles away.The researchers said:
As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars. We have verified the attack vector on multiple varieties of Tesla Model S. It is reasonable to assume that other Tesla models are affected.To read this article in full or to leave a comment, please click here
Echo Dot is a hands-free, voice-controlled device that uses Alexa to play & control music (either on its own, or through a connected speaker/receiver), control smart home devices, provide information, read the news, set alarms, and more. If you’re looking to buy them as gifts, or for different homes or rooms, Amazon will throw in a free one ($50 value) when you buy 5, or two free ones when you buy 10 (a $100 value). To take advantage of this limited time offer, select 6 or 12 in the quantity dropdown and add to your Shopping Cart. Enter promo code DOT6PACK or DOT12PACK at checkout where you will see the discount applied. The new Amazon Echo Dot comes in black, and now also white. See the new Amazon Echo Dot now on Amazon.To read this article in full or to leave a comment, please click here
Previous migration efforts are often so bad that the majority of IT pros drag their feet on doing another migration project, even if they need it. That's one of the results of a new study by a cloud migration specialist Vision Solutions.The migration survey -- see chart below -- was part of a larger study, the Vision Solutions' 8th Annual State of Resilience report.The problem, however, lies with many IT shops, according to Vision. They either lack expertise to do the job properly, don't plan well in advance, or both. Of the 935 professionals surveyed, 35 percent say that they lack the experience or the expertise to confidently perform a system migration.To read this article in full or to leave a comment, please click here
Project management involves the use of people, processes and methodologies to plan, initiate, execute, monitor and close activities. It is designed to meet an organization's project goals, and hopefully overall strategic objectives.
Change management, similar to project management, involves people, processes, and tools to effectively help organizations manage all the changes that occur, whether as a result of project initiatives, or other factors that might impact the business.
While project management and change management are two areas often work side-by-side -- and they should -- there are some similarities. However, these are different disciplines. Think about project management in the example of software development and implementation. A project manager works with a project team to plan, communicate and execute the actual development and implementation itself. A change manager will work with the same project management team to identify, communicate, and effectively manage all aspects relating to how any changes will ultimately impact all stakeholders.To read this article in full or to leave a comment, please click here
Trust, but verify, the old adage goes. But in a tight IT talent market, it seems hiring companies are doing a heck of a lot of the former and not enough of the latter. New research shows that organizations are trusting employees when they say they've attained certifications, but aren't investing the time or energy to verify whether or not those credentials have actually been earned."We'd heard this anecdotally, but to see it in the hard data was very concerning, and it made us cringe. The value in the certifications themselves isn't in question, but the lack of action by hiring managers and the fact that some candidates are fudging the truth makes everyone look bad. This has the potential to seriously impede the credibility of certifications to qualify and benchmark candidates," says Jason Hayman, market research manager at TEKSystems, which conducted the research.To read this article in full or to leave a comment, please click here
The days of Microsoft's System Center may be numbered. With the introduction of Windows 10, Microsoft has begun championing a different approach to systems management -- the same approach that Apple created for the iPad and iPhone, and Google later adopted for Android. Organizations adopting Windows 10 can take advantage of this new approach, allowing IT to manage all client devices -- Windows 10 PCs (as older Windows versions are retired), Macs, iOS devices, and Android devices -- from the same consoles, using the same policy-driven technology in what is called an omnidevice strategy.To read this article in full or to leave a comment, please click here(Insider Story)
It's what's inside that countsImage by Mike HomnickIt’s the day everybody dreads: You power up your PC and it sits dormant, failing to boot because your hard drive or SSD is dead. But after you stop cursing and reaching for your backups—you do create backups regularly, right?—you might as well make the best of things.To read this article in full or to leave a comment, please click here
For as long as there have been technology certifications, IT pros have debated their value. Some believe they're the key to a fatter paycheck, while others contend that they're often not worth the paper they're printed on. Others take the middle road and say they can be valuable in the right circumstances, but experience is king.To read this article in full or to leave a comment, please click here(Insider Story)
1. Let two become one—safelyImage by PexelsStephen Boyer, CTO and co-founder of BitSight, knows one of the biggest threats to your company's tech security: the possibility that it might buy another company. He points to a survey from West Monroe Partners that found that 40% of acquiring companies discovered a cybersecurity problem in an acquired company—after a deal went through. It probably shouldn't be surprising that, in a 2014 survey from Freshfields Bruckhaus Deringer, a staggering 78% of respondents said cybersecurity is not analyzed in-depth as part of due diligence in an acquisition.To read this article in full or to leave a comment, please click here
iOS’s Settings app is the quiet MVP of Apple’s mobile operating system: It’s the place you go to when you need to get something done, and get it done your way. So whenever you update iOS on your iPhone or iPad, it pays to peruse the settings to find, enable, and configure any new features just to your liking. The biggies for iOS 10? Maps, with its plethora of new features, and Siri, since she now supports third-party app integration.Here’s a rundown of the major changes in Settings in iOS 10, as well as some key settings that didn’t change, but you still might want to revisit. If you’ve got any questions, hit us up in the comments. To read this article in full or to leave a comment, please click here