Archive

Category Archives for "Networking"

Security-as-a-service supplier Alert Logic started with IDS and blossomed from there

Gray Hall, CEO of Alert Logic, cut his teeth delivering enterprise-class services when he started VeriCenter, one of the earliest managed hosting companies.  Hall eventually sold that company to SunGard Data Systems in 2007, and in 2009 joined Alert Logic where he has since driven revenue growth 12x.  Network World Editor in Chief John Dix recently caught up with Hall to learn more about Alert Logic and the security-as-a-service movement.Lets start with a brief background on the company.Alert Logic was founded in 2002 -- the founders are still with us today in very key roles – and the original vision was to bring together SaaS and managed security services, starting with Intrusion Detection Systems (IDS). Sourcefire had been around for a long time, they were the gorilla in the space (now owned by Cisco), but Sourcefire is a very advanced product and most of our customers would say it’s expensive, complex, and you need a lot of expertise to make it work.  It’s only as good as the content you feed it and once you reconfigure your network, you have to do it all over again … tuning, configuration, etc.To read this article in full Continue reading

After revolutionizing the music industry, the MP3 is officially dead

The MP3 file format, the one that helped the iPod become a mainstream and iconic device, is now officially dead.According to a new report via NPR, the Fraunhofer Institute for Integrated Circuits has stopped providing licenses for MP3 technology, noting that more superior audio formats have rendered the MP3 obsolete. Speaking to NPR, the Fraunhofer Institute said AAC has since become the "de facto standard for music download and videos on mobile phones."A statement on the matter reads: We thank all of our licensees for their great support in making mp3 the de facto audio codec in the world, during the past two decades.To read this article in full or to leave a comment, please click here

Building Linux-powered devices, part 1: Making my Linux-only world a reality

Sometimes, if you want something badly enough, you need to get off your lazy tuchus and make it happen yourself. For years now, I've been hoping and pining (and often complaining and whining) about how much I want Linux-powered... everything. Not Android. Not ChromeOS. Real Linux. The kind of Linux you have full control over—the sort you'd install on your desktop PC. And when I say "everything," I mean everything. The set-top box connected to my TV. My game consoles (including handheld game consoles). Tablets. PDAs. Home server. The works. All of it. Running Linux and free software. To read this article in full or to leave a comment, please click here

How to make Fully Homomorphic Encryption “practical and usable”

Fully Homomorphic Encryption (FHE) for years has been a promising approach to protecting data while it’s being computed on, but making it fast enough and easy enough to use has been a challenge.The Intelligence Advanced Research Projects Activity, which has been leading the Department of Defense’s examination of this topic, recently awarded research and development firm Galois a $1M contract to explore ways to bring FHE to programmers. The goal, says Galois Principal Investigator Dr. David Archer, is making FHE “practical and usable,” and his outfit is working with researchers at the New Jersey Institute of Technology on this front via the Rapid Machine-learning Processing Applications and Reconfigurable Targeting of Security (RAMPARTS) initiative. To read this article in full or to leave a comment, please click here

How to make Fully Homomorphic Encryption “practical and usable”

Fully Homomorphic Encryption (FHE) for years has been a promising approach to protecting data while it’s being computed on, but making it fast enough and easy enough to use has been a challenge.The Intelligence Advanced Research Projects Activity, which has been leading the Department of Defense’s examination of this topic, recently awarded research and development firm Galois a $1M contract to explore ways to bring FHE to programmers. The goal, says Galois Principal Investigator Dr. David Archer, is making FHE “practical and usable,” and his outfit is working with researchers at the New Jersey Institute of Technology on this front via the Rapid Machine-learning Processing Applications and Reconfigurable Targeting of Security (RAMPARTS) initiative. To read this article in full or to leave a comment, please click here

57% off Anker PowerCore Fusion 5000 2-in-1 Portable Charger and Wall Charger – Deal Alert

Charge your device and PowerCore Fusion's internal battery via a wall outlet, then take it with you for up to 3 phone charges -- any place, any time. In the wall or on-the-go, Anker's exclusive PowerIQ and VoltageBoost technologies ensure that all devices receive their fastest possible charge. Also features a foldable plug to ensure maximum portability. At the moment, its list proce of $50.99 is reduced 57% on Amazon to just $21.99. See the discounted Anker PowerCore 5000 on Amazon.To read this article in full or to leave a comment, please click here

8 ways to manage an internet or security crisis

Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are just some of the problems that ecommerce, technology and other companies experience at one time or another.The issue is not if a problem – or crisis – occurs, but how your company handles it when it does. Manage the problem poorly, you risk losing customers, or worse. Handle a crisis promptly and professionally, you can fend off a public relations disaster and might even gain new customers.So what steps can businesses take to mitigate and effectively manage an IT-related crisis? Here are eight suggestions.To read this article in full or to leave a comment, please click here

8 ways to manage an internet or security crisis

Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are just some of the problems that ecommerce, technology and other companies experience at one time or another.The issue is not if a problem – or crisis – occurs, but how your company handles it when it does. Manage the problem poorly, you risk losing customers, or worse. Handle a crisis promptly and professionally, you can fend off a public relations disaster and might even gain new customers.So what steps can businesses take to mitigate and effectively manage an IT-related crisis? Here are eight suggestions.To read this article in full or to leave a comment, please click here

8 ways to manage an internet or security crisis

Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are just some of the problems that ecommerce, technology and other companies experience at one time or another.The issue is not if a problem – or crisis – occurs, but how your company handles it when it does. Manage the problem poorly, you risk losing customers, or worse. Handle a crisis promptly and professionally, you can fend off a public relations disaster and might even gain new customers.So what steps can businesses take to mitigate and effectively manage an IT-related crisis? Here are eight suggestions.To read this article in full or to leave a comment, please click here

WannaCry attacks are only the beginning

Thousands of organizations from around the world were caught off guard by the WannaCry ransomware attack launched Friday. As this rapidly spreading threat evolves, more cybercriminals are likely to attempt to profit from this and similar vulnerabilities.As a ransomware program, WannaCry itself is not that special or sophisticated. In fact, an earlier version of the program was distributed in March and April and, judging by its implementation, its creators are not very skilled.To read this article in full or to leave a comment, please click here

WannaCry attacks are only the beginning

Thousands of organizations from around the world were caught off guard by the WannaCry ransomware attack launched Friday. As this rapidly spreading threat evolves, more cybercriminals are likely to attempt to profit from this and similar vulnerabilities.As a ransomware program, WannaCry itself is not that special or sophisticated. In fact, an earlier version of the program was distributed in March and April and, judging by its implementation, its creators are not very skilled.To read this article in full or to leave a comment, please click here

What to do about WannaCry if you’re infected or if you’re not

Today is likely to be painful for many organizations all over the world that took the weekend off and are returning to the work-week to find hundreds or thousands of computers on their networks encrypted by WannaCry ransomware, which surfaced Friday and has been propagating ever since.Estimates by law enforcement agency Europol estimated yesterday that more than 200,000 computers in 150 countries were infected, but with the worm continuing to spread to vulnerable Windows machines, that number will surely rise.For those whose machines have not been infected, here’s what you need to do right away: Apply the Microsoft patch that will thwart the attack. It’s available here. If you can’t do that because you haven’t tested whether the patch will affect your software build, disable Server Message Block 1 (SMB1) network file sharing. That’s where the flaw is that it attacks. Consider closing firewall port 139, 445 or both because these are the ports SMB uses. Longer term, to guard against similar future attacks you should:To read this article in full or to leave a comment, please click here

What to do about WannaCry if you’re infected or if you’re not

Today is likely to be painful for many organizations all over the world that took the weekend off and are returning to the work-week to find hundreds or thousands of computers on their networks encrypted by WannaCry ransomware, which surfaced Friday and has been propagating ever since.Estimates by law enforcement agency Europol estimated yesterday that more than 200,000 computers in 150 countries were infected, but with the worm continuing to spread to vulnerable Windows machines, that number will surely rise.For those whose machines have not been infected, here’s what you need to do right away: Apply the Microsoft patch that will thwart the attack. It’s available here. If you can’t do that because you haven’t tested whether the patch will affect your software build, disable Server Message Block 1 (SMB1) network file sharing. That’s where the flaw is that it attacks. Consider closing firewall port 139, 445 or both because these are the ports SMB uses. Longer term, to guard against similar future attacks you should:To read this article in full or to leave a comment, please click here

Samsung to detail new Tizen OS for smart home appliances, IoT devices

In the future, your Samsung vacuum cleaner, robot or washing machine will run on an OS called Tizen RT, slated to be introduced and detailed on Tuesday.The OS for smart devices and gadgets -- in other words, internet of things (IoT) devices -- will be introduced by Samsung at its Tizen Developers Conference, which will be held in San Francisco starting Tuesday.Samsung will share the architecture and future release schedule for Tizen RT at the conference. A number of sessions are being held on how to deploy and update the OS across devices.The real-time OS is a slimmed-down version of the mainstream Tizen OS, which is being used in Samsung TVs, smartphones, Gear smartwatches and other devices. Though it is an open-source OS, Samsung is its biggest backer.To read this article in full or to leave a comment, please click here