Archive

Category Archives for "Networking"

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by different groups of varying skills and expertise, all following instructions provided by one malicious actor, McAfee researchers have found.Researchers at McAfee Strategic Intelligence believe the 2012 Shamoon attacks against Saudi Arabia’s state-run oil company Saudi Aramco and Qatari natural gas company RasGas, the attacks last November against Saudi organizations, and these latest attacks are all the work of hacker groups supported and coordinated by a single actor, and not the efforts of multiple gangs operating independently, said McAfee principal engineer Christiaan Beek and McAfee chief scientist Raj Samani. To read this article in full or to leave a comment, please click here

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by different groups of varying skills and expertise, all following instructions provided by one malicious actor, McAfee researchers have found.Researchers at McAfee Strategic Intelligence believe the 2012 Shamoon attacks against Saudi Arabia’s state-run oil company Saudi Aramco and Qatari natural gas company RasGas, the attacks last November against Saudi organizations, and these latest attacks are all the work of hacker groups supported and coordinated by a single actor, and not the efforts of multiple gangs operating independently, said McAfee principal engineer Christiaan Beek and McAfee chief scientist Raj Samani. To read this article in full or to leave a comment, please click here

Report: Top 25 IT security products

Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated products in security categories such as cloud security, firewalls, security information and event management (SIEM), application security and internet of things (IoT) security.IT Central Station selected the product leaders in each security category. The report uses a scoring methodology based on a combination of buyer interest, the number of reviews (at least 10), and the average rating in those reviews.To read this article in full or to leave a comment, please click here(Insider Story)

Security-as-a-service model gains traction

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here

Security-as-a-service model gains traction

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here

Report: Top 25 IT security products

Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated products in security categories such as cloud security, firewalls, security information and event management (SIEM), application security and internet of things (IoT) security.To read this article in full or to leave a comment, please click here(Insider Story)

Security-as-a-service model gains traction

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here

Google becomes first foreign internet company to launch service in Cuba

Google servers inside Cuba are now live on the internet, marking a major milestone in the country's communications evolution and promising faster access to Google's services for Cuban users.The computers are part of Google's global network of caching servers, which store frequently requested content locally so it doesn't have to be accessed over long distances.That speeds up access in any country but is particularly important in a nation like Cuba, which has relatively low connectivity to the rest of the world.Cuba is connected to the rest of the internet almost exclusively via the ALBA-1 submarine cable, which runs from the island to Venezuela, said Doug Madory, director of internet analysis at Dyn Research. Dyn was first to spot the emergence of the Google caching servers on the internet.To read this article in full or to leave a comment, please click here

Google becomes first foreign internet company to launch service in Cuba

Google servers inside Cuba are now live on the internet, marking a major milestone in the country's communications evolution and promising faster access to Google's services for Cuban users.The computers are part of Google's global network of caching servers, which store frequently requested content locally so it doesn't have to be accessed over long distances.That speeds up access in any country but is particularly important in a nation like Cuba, which has relatively low connectivity to the rest of the world.Cuba is connected to the rest of the internet almost exclusively via the ALBA-1 submarine cable, which runs from the island to Venezuela, said Doug Madory, director of internet analysis at Dyn Research. Dyn was first to spot the emergence of the Google caching servers on the internet.To read this article in full or to leave a comment, please click here

Response: Don’t believe the non-programming hype – Paul’s blog

Paul Gear has a great response to a recent Packet Pushers Weekly episode on programming/automation and this particular view that I agree with: Programming isn’t hype; programming is a fundamental IT skill.  If you don’t understand the basics of computer architecture (e.g. CPU instruction pointers, registers, RAM, stacks, cache, etc.) and how to create instructions […]

The post Response: Don’t believe the non-programming hype – Paul’s blog appeared first on EtherealMind.

IDG Contributor Network: The hybrid evolution of IT

It’s a great time to be in information technology.While that statement is true, not everyone clearly understands why (or perhaps has the fortitude to make it so). In the face of a massive movement to public cloud—by 2020, 92 percent of world’s workloads will be in cloud, with 68 percent in public and 32 percent in private—many in IT feel their value in the workplace eroding along with their identity.That feeling doesn’t need to be reality. Businesses are changing the way they operate and are transforming to leverage IT more strategically. IT has a real opportunity to lead this transformation, not let the transformation happen to them.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The hybrid evolution of IT

It’s a great time to be in information technology.While that statement is true, not everyone clearly understands why (or perhaps has the fortitude to make it so). In the face of a massive movement to public cloud—by 2020, 92 percent of world’s workloads will be in cloud, with 68 percent in public and 32 percent in private—many in IT feel their value in the workplace eroding along with their identity.That feeling doesn’t need to be reality. Businesses are changing the way they operate and are transforming to leverage IT more strategically. IT has a real opportunity to lead this transformation, not let the transformation happen to them.To read this article in full or to leave a comment, please click here

Surprisingly few tech insights in Steve Ballmer’s USAFacts data trove

Former Microsoft CEO Steve Ballmer's USAFacts project, an ambitious and sometimes overwhelming repository of data about local to state to federal U.S. government spending and outcomes that was launched on Tax Day, is surprisingly light on technology-related data.Not that Ballmer is obligated to spend his post-Microsoft life focused on technology —indeed, he's mainly been known for his purchase of the NBA's Los Angeles Clippers in recent years — but given his background I expected that I might find more tech-related nuggets in this graphically-pleasing data trove that's been three years in the making. Interested in the possibilities for data journalism stories spun from USAFacts, I made an inquiry to the outfit's media relations contact and will update this post if I hear back from them with any clarification on possible additions of such techie numbers.To read this article in full or to leave a comment, please click here

Save $51 on Samsung Gear S3 Frontier Smartwatch Right Now – Deal Alert

Gear S3 frontier in dark gray is a timeless smartwatch, combining style with the latest innovation in digital technology. It features an always-on 1.3” super AMOLED full color display, and a distinctive steel bezel that you rotate to access apps or text, call and other notifications. Make payments via Samsung Pay. Keep track of your activity or share your location with its built-in GPS. And much more. With military-grade performance, the Gear S3 resists water, dust, extreme temperatures and the occasional drop. Gear S3 averages 4.5 out of 5 stars from over 900 customers on Amazon (read recent reviews here), where its typical list price of $349.99 is currently discounted down to $299, saving you 15%. See this deal on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cyber crime as a service forces changes in information security

Cyber crime has been commercialized. Infecting computers with ransomware or using an advanced persistent threat to pilfer intellectual property no longer requires deep technical knowledge. Just use Google to learn how to access the Dark Web, and you can find hackers who, for a price, are more than happy to write malware, create highly effective spear phishing campaigns and develop bogus websites for harvesting login credentials.+ Also on Network World: DDoS-for-hire services thrive despite closure of major marketplace + Major companies (think Fortune 500 organizations) understand that cyber crime as a service has changed how they handle defense. But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security.  To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cyber crime as a service forces changes in information security

Cyber crime has been commercialized. Infecting computers with ransomware or using an advanced persistent threat to pilfer intellectual property no longer requires deep technical knowledge. Just use Google to learn how to access the Dark Web, and you can find hackers who, for a price, are more than happy to write malware, create highly effective spear phishing campaigns and develop bogus websites for harvesting login credentials.+ Also on Network World: DDoS-for-hire services thrive despite closure of major marketplace + Major companies (think Fortune 500 organizations) understand that cyber crime as a service has changed how they handle defense. But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security.  To read this article in full or to leave a comment, please click here