Archive

Category Archives for "Networking"

IDG Contributor Network: 3 ways big firms can compete with startups for top tech talent

CIOs looking to hire good talent risk being caught in a pincer as fast rising demand runs up against falling supply. Ever more companies and functions need staff with strong tech skills, while the number of STEM graduates in developed countries is in decline. Yet perhaps the most difficult part of the challenge is competition with startups. Startups offer much of what IT employees prioritize when considering an employer – compensation, future career opportunities and ongoing development, according to data from CEB, now part of Gartner (Disclosure: I am employed by CEB, now Gartner).In addition to a competitive salary, many startups attract top talent by offering the opportunity to own a stake in the company. They give employees the opportunity to move ideas quickly from conception to commercialization and to move careers forward at a similar pace, instead of waiting several years. While most big companies talk a good game about innovation and creativity, in reality caution usually comes first. In contrast, creative and independent work is the lifeblood of many startups.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The future of IoT: Where it’s heading, what to expect

The subject of the Internet of Things (IoT) has an extremely broad range of interpretations. Some immediately think of the “thing” itself as a connected thermostat. Others see it as a means to extend products into services. Most interpretations gravitate toward financial reward through data collection and analysis.I recently attended IoT World in Santa Clara, California, and was struck by this diversity. Every conversation I witnessed had a five-minute preamble/negotiation just to agree on a common perspective. It’s kind of like the three blind men and the elephant parable, but instead of three men, it’s 1,000 people touching a sculpture made of wet clay.To read this article in full or to leave a comment, please click here

Leveraging SD-WAN for Mergers & Acquisitions

A colleague recently asked me if SD-WAN could be leveraged to expedite network integration as a result of a merger or acquisition. His thoughts were that this could potentially provide a means to securely integration networks in a short amount of time.  At first I thought this made no sense — SD-WAN is not related to this challenge […]

The post Leveraging SD-WAN for Mergers & Acquisitions appeared first on Overlaid.

Area 1 Security stops phishing campaigns before they become attacks

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.Anyone who has spent any amount of time trying to secure their organization’s endpoints or network would not be surprised to learn that phishing is now the #1 delivery vehicle for malware and ransomware.According to Mandiant, phishing was used in about 95 percent of the cases of successful breaches where an attacker has been able to get into a target network and do something malicious. A phishing campaign is likely to have a 90 percent success rate—i.e., someone takes the bait—when the campaign is sent to 10 or more people.To read this article in full or to leave a comment, please click here

Area 1 Security stops phishing campaigns before they become attacks

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.Anyone who has spent any amount of time trying to secure their organization’s endpoints or network would not be surprised to learn that phishing is now the #1 delivery vehicle for malware and ransomware.According to Mandiant, phishing was used in about 95 percent of the cases of successful breaches where an attacker has been able to get into a target network and do something malicious. A phishing campaign is likely to have a 90 percent success rate—i.e., someone takes the bait—when the campaign is sent to 10 or more people.To read this article in full or to leave a comment, please click here

Shadow Brokers reveal details about June monthly dump service: 100 Zcash (about $23k)

The Shadow Brokers revealed pricing and other details about its monthly dump service which kicks off in June. Subscribers of the dump of the month club will not be shelling out bitcoins, but a different cryptocurrency: 100 (ZEC) Zcash. At the time of publishing, 100 Zcash was equal to $23,251.Over the weekend, the Shadow Brokers moved bitcoins worth about $24,000 to over 30 smaller wallets. The bitcoins had been received back when the group was trying to auction off the hacking tools. Mikko Hypponen noticed the change after an alert he set on their bitcoin wallet went off.To read this article in full or to leave a comment, please click here

Shadow Brokers reveal details about June monthly dump service: 100 Zcash (about $23k)

The Shadow Brokers revealed pricing and other details about its monthly dump service which kicks off in June. Subscribers of the dump of the month club will not be shelling out bitcoins, but a different cryptocurrency: 100 (ZEC) Zcash. At the time of publishing, 100 Zcash was equal to $23,251.Over the weekend, the Shadow Brokers moved bitcoins worth about $24,000 to over 30 smaller wallets. The bitcoins had been received back when the group was trying to auction off the hacking tools. Mikko Hypponen noticed the change after an alert he set on their bitcoin wallet went off.To read this article in full or to leave a comment, please click here

Nextcloud 12 expands data storage to support large organizations

Online ("cloud") file storage services are undeniably handy—for individuals and large organizations alike.Being able to toss files (spreadsheets, images, backups, etc.) somewhere, especially if that somewhere is easy to share with those you interact and work with, is crazy convenient. It certainly beats the pants off tediously sending files to your co-workers via email (or, worse, sneakernet).RELATED: Engineering firm uses cloud storage to speed file loads, and then unplugs its MPLS net Services such as Google Drive and Dropbox are easy to setup and use. And as a result, just about everybody (and their dog) have an account on one or the other. Many companies even utilize one of these for storing files across their organization.To read this article in full or to leave a comment, please click here

Nokia NFV MANO Report Webinar Q&A: Automating Orchestration for Agile Services

Nokia NFV MANO Report Webinar Q&A Thanks to all who joined us for the Nokia NFV MANO Report Webinar: “Automating Orchestration for Agile Services”, where Nokia discussed integrating VNFs, automating VNF lifecycle management, and reliably constructing network service chains. After the webinar, we took questions from the audience but unfortunately ran out of time before we could answer everybody’s questions. You can read... Read more →

53% off Nulaxy Wireless In-Car FM Bluetooth Kit with Display and USB Charger – Deal Alert

Nulaxy's car transmitter works with Bluetooth enabled devices like smartphones and tablets to wirelessly transmit audio through your car's speakers. Its display will show incoming call & music information, and also features a USB charging port. Listed as a #1 best seller on Amazon, it currently averages 4.5 stars out of 5 from over 5,400 people (read reviews). The typical list price on Nulaxy's KM18 transmitter is $36.99, but right now it's discounted 53% to just $17.49. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

33% off Prey for Xbox One and PlayStation 4 – Deal Alert

In Prey, you awaken aboard Talos I, a space station orbiting the moon in the year 2032. You are the key subject of an experiment meant to alter humanity forever – but things have gone terribly wrong. The space station has been overrun by hostile aliens and you are now being hunted. As you dig into the dark secrets of Talos I and your own past, you must survive using the tools found on the station, your wits, weapons, and mind-bending abilities. Right now you can get 33% off the listed price. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Massive British Airways IT outage shows hacking isn’t the only enterprise risk

It was a busy holiday weekend, and Great Britain’s national flag carrier was forced to ground all flights out of London’s two main airports, Heathrow and Gatwick—which affected the airline’s operations around the world. Oh, and the incident also affected British Airways’ call centers and online booking sites, making the situation even more frustrating for stranded passengers.Most operations have now been restored, the airline says, but more than 1,000 flights were canceled and 75,000 passengers stranded. But here’s the thing: The problems weren’t due to some evil cyber attack or ransomware assault. Nope, it was just another “global IT system failure,” reportedly British Airways’ sixth such incident in the last year alone!To read this article in full or to leave a comment, please click here