Archive

Category Archives for "Networking"

Get $100 Back If You Order Two Newly Announced Amazon Echo Show Devices Right Now – Deal Alert

The newly-announced Echo Show is available for pre-order in black or white and will start shipping on Wednesday, June 28. Right now if you buy two of them and enter the code SHOW2PACK at checkout, you'll activate a special $100 discount. So you'll get two new Echo Shows for the price of two standard Echos. Go in on this deal with a friend, or buy a few for yourself (they work very well in multiple rooms). Echo Show brings you everything you love about Alexa, and now she can show you things. Watch video flash briefings and YouTube, talk with family and friends (if they have Echos as well), see music lyrics, security cameras, photos, weather forecasts, to-do and shopping lists, and more. All hands-free—just ask. Select two-day shipping when you check out, and Amazon says you'll have it the very day it's released. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

What it takes to be a security architect

Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able to think as hackers do in order to anticipate the tactics attackers can use to gain unauthorized access to those systems, according to the InfoSec Institute.To read this article in full or to leave a comment, please click here(Insider Story)

What it takes to be a security architect

Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able to think as hackers do in order to anticipate the tactics attackers can use to gain unauthorized access to those systems, according to the InfoSec Institute.Anyone in this position can expect to have to work odd hours on occasion, and needs to be constantly up to date on the latest security threats and available tools.Sometimes people who ultimately take on the role of security architect, like Jerod Brennen, could not have predicted such a career direction when they were younger. When Brennen began attending Capital University, a small liberal arts college in Ohio, in the 1990s, he intended to pursue a career in the film industry as a composer.To read this article in full or to leave a comment, please click here(Insider Story)

Mobile is the new desktop, and that’s good for enterprise apps

Android surpassed Microsoft's Windows in March to become the most popular operating system on the internet, according to figures compiled by GlobalStats, the research arm of web analytics company StatCounter.GlobalStats found that, worldwide, Android had a 37.93 percent internet usage market share, just ahead of Windows at 37.91 percent. "This is a milestone in technology history and the end of an era," said Aodhan Cullen, StatCounter's CEO.  "It marks the end of Microsoft’s leadership worldwide of the OS market which it has held since the 1980s. It also represents a breakthrough for Android, which held just 2.4 percent of global internet usage share only five years ago."To read this article in full or to leave a comment, please click here

Why smart contracts can’t be fully automated

Blockchain technology has been generating excitement in the public and private sectors for the past several years for many reasons — a prominent one being support for self-executing contracts commonly referred to as smart contracts. But while smart contracts have the potential to streamline many business processes, full automation isn't likely anytime in the foreseeable future."Smart contracts are a combination of some certain binary actions that can be translated into code and some reference to plain language like we have today that is open to litigation if you mess up," says Antonis Papatsaras, CTO of enterprise content management company SpringCM, which specializes in contract workflow automation. "I think it's going to take forever."To read this article in full or to leave a comment, please click here

Why smart contracts can’t be fully automated

Blockchain technology has been generating excitement in the public and private sectors for the past several years for many reasons — a prominent one being support for self-executing contracts commonly referred to as smart contracts. But while smart contracts have the potential to streamline many business processes, full automation isn't likely anytime in the foreseeable future."Smart contracts are a combination of some certain binary actions that can be translated into code and some reference to plain language like we have today that is open to litigation if you mess up," says Antonis Papatsaras, CTO of enterprise content management company SpringCM, which specializes in contract workflow automation. "I think it's going to take forever."To read this article in full or to leave a comment, please click here

Vendors approve of NIST password draft

A recently released draft of the National Institute of Standards and Technology’s (NIST's) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies.The new framework recommends, among other things: Remove periodic password change requirements There have been multiple studies that have shown requiring frequent password changes to actually be counterproductive to good password security, said Mike Wilson, founder of PasswordPing. NIST said this guideline was suggested because passwords should be changed when a user wants to change it or if there is indication of breach.To read this article in full or to leave a comment, please click here

Vendors approve of NIST password draft

A recently released draft of the National Institute of Standards and Technology’s (NIST's) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies.The new framework recommends, among other things: Remove periodic password change requirements There have been multiple studies that have shown requiring frequent password changes to actually be counterproductive to good password security, said Mike Wilson, founder of PasswordPing. NIST said this guideline was suggested because passwords should be changed when a user wants to change it or if there is indication of breach.To read this article in full or to leave a comment, please click here

Video analytics: Coming soon to a smart city near you

Earlier this week at its GPU Technology Conference, Nvidia announced a new video analytics platform, Metropolis, that promises to make cities safer and smarter and should eventually bring game-changing capabilities to other industries.The heart of Metropolis is deep learning enabled by Nvidia’s range of GPUs that provide the necessary horsepower for artificial intelligence to be performed on every video stream.+ Also on Network World: Smart city tech growing in the U.S. + The GPU Technology Conference is the right place to show off advancements in something like video analytics, as it has become the flagship event to showcase how GPUs can literally change the world by enabling AI to do some things smarter and faster than people.To read this article in full or to leave a comment, please click here

Video analytics: Coming soon to a smart city near you

Earlier this week at its GPU Technology Conference, Nvidia announced a new video analytics platform, Metropolis, that promises to make cities safer and smarter and should eventually bring game-changing capabilities to other industries.The heart of Metropolis is deep learning enabled by Nvidia’s range of GPUs that provide the necessary horsepower for artificial intelligence to be performed on every video stream.+ Also on Network World: Smart city tech growing in the U.S. + The GPU Technology Conference is the right place to show off advancements in something like video analytics, as it has become the flagship event to showcase how GPUs can literally change the world by enabling AI to do some things smarter and faster than people.To read this article in full or to leave a comment, please click here

FCC should produce logs to prove ‘multiple DDoS attacks’ stopped net neutrality comments

After John Oliver urged viewers of HBO’s Last Week Tonight to fight for net neutrality (again), even simplified the process for leaving comments by having a new URL, gofccyourself.com, redirect to the point where a person needs only to click “Express” to leave a comment, people were not able to submit comments because the site turned to molasses.The FCC blamed (pdf) the problem on “multiple” DDoS attacks. “These were deliberate attempts by external actors to bombard the FCC’s comment system with a high amount of traffic to our commercial cloud host. These actors were not attempting to file comments themselves; rather they made it difficult for legitimate commenters to access and file with the FCC.”To read this article in full or to leave a comment, please click here

FCC should produce logs to prove ‘multiple DDoS attacks’ stopped net neutrality comments

After John Oliver urged viewers of HBO’s Last Week Tonight to fight for net neutrality (again) and post comments on the FCC's site, people were not able to submit comments because the site turned to molasses.The FCC blamed the problem on “multiple” DDoS attacks: “These were deliberate attempts by external actors to bombard the FCC’s comment system with a high amount of traffic to our commercial cloud host. These actors were not attempting to file comments themselves; rather they made it difficult for legitimate commenters to access and file with the FCC.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Settling scores with risk scoring

Risk scores seem all the rage right now. Executives want to know what their risk is. The constant stream over the past few years of high profile breaches and the resulting class action lawsuits, negative PR, loss in share price, cybersecurity insurance pay-out refusals, and even termination of liable executives has made this an urgent priority. The problem is we haven’t really developed a good way to measure risk.Most risk score approaches are restricted by a very simple limitation: They are not vendor agnostic or universal. The solution used to calculate risk is limited by the data it collects, which can vary widely.  What is the risk score composed of? More important, what doesn’t it capture? One vendor will include only network and system vulnerabilities, another bundles application vulnerabilities into the mix, and yet another adds user behaviour. Agreeing on the “right” mix still eludes us with no real authoritative standards that define what should be included. Every scoring methodology is subjective, which is surely a sign of how inherently unscientific the entire approach is.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Settling scores with risk scoring

Risk scores seem all the rage right now. Executives want to know what their risk is. The constant stream over the past few years of high profile breaches and the resulting class action lawsuits, negative PR, loss in share price, cybersecurity insurance pay-out refusals, and even termination of liable executives has made this an urgent priority. The problem is we haven’t really developed a good way to measure risk.Most risk score approaches are restricted by a very simple limitation: They are not vendor agnostic or universal. The solution used to calculate risk is limited by the data it collects, which can vary widely.  What is the risk score composed of? More important, what doesn’t it capture? One vendor will include only network and system vulnerabilities, another bundles application vulnerabilities into the mix, and yet another adds user behaviour. Agreeing on the “right” mix still eludes us with no real authoritative standards that define what should be included. Every scoring methodology is subjective, which is surely a sign of how inherently unscientific the entire approach is.To read this article in full or to leave a comment, please click here

Microsoft fixes remote hacking flaw in Windows Malware Protection Engine

Microsoft has released an update for the malware scanning engine bundled with most of its Windows security products in order to fix a highly critical vulnerability that could allow attackers to hack computers.The vulnerability was discovered by Google Project Zero researchers Tavis Ormandy and Natalie Silvanovich on Saturday and was serious enough for Microsoft to create and release a patch by Monday. This was an unusually fast response for the company, which typically releases security updates on the second Tuesday of every month and rarely breaks out of that cycle.Ormandy announced Saturday on Twitter that he and his colleague found a "crazy bad" vulnerability in Windows and described it as "the worst Windows remote code execution in recent memory."To read this article in full or to leave a comment, please click here

Microsoft fixes remote hacking flaw in Windows Malware Protection Engine

Microsoft has released an update for the malware scanning engine bundled with most of its Windows security products in order to fix a highly critical vulnerability that could allow attackers to hack computers.The vulnerability was discovered by Google Project Zero researchers Tavis Ormandy and Natalie Silvanovich on Saturday and was serious enough for Microsoft to create and release a patch by Monday. This was an unusually fast response for the company, which typically releases security updates on the second Tuesday of every month and rarely breaks out of that cycle.Ormandy announced Saturday on Twitter that he and his colleague found a "crazy bad" vulnerability in Windows and described it as "the worst Windows remote code execution in recent memory."To read this article in full or to leave a comment, please click here

40% off Lexar microSD To Lightning Reader – Deal Alert

Lexar's microSD-to-Lightning reader makes it easy to move all your favorite content to & from your iOS device on the go. So whether you’re offloading stunning action photos from that sporting event, or dramatic video from your drone, or if you just want a simple solution to back up or move around your files while mobile -- it’s got you covered. With its small footprint, you can put it in your pocket and go. And the Lightning connector fits with most iOS cases, providing simple plug-and-play functionality. An optional app from the app store allows you to back up files when connected to your device for greater peace of mind. Lexar's microSD to Lightning reader averages 4 out of 5 stars on Amazon, where its typical list price of $24.99 has been reduced a generous 40%, for now, to just $14.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Full Stack Journey 007: Ed Horley

On today's episode my guest is Ed Horley, who leads the cloud practice team for a Silicon Valley VAR. Ed may better be known as the “IPv6 dude” but today he’s talking about the business awareness and managerial aspects of the Full Stack Journey.