Archive

Category Archives for "Networking"

Help Shape the Future of the Internet

This year, the Internet Society celebrates its 25th anniversary.  Our own history is inextricably tied to the history of the Internet. We were founded in 1992 by Internet pioneers who believed that “a society would emerge from the idea that is the Internet” – and they were right.

As part of the celebration, this September we will launch a comprehensive report that details the key forces that could impact the future of the Internet. The report will also offer recommendations for the Future and we need your input.

Constance Bommelaer de Leusse

IDG Contributor Network: Why we need more shades of gray

Few things in life can be expressed in black and white terms. Sure, a light switch is either on or it's off; one baseball team wins the World Series each year and one doesn't; and every line of computer binary starts with either a one or a zero.Most of the time, though, our lives are full of gray areas, not absolutes. Brent crude almost never drops below $40 a barrel, but it did happen once and the chances of it happening again are greater than zero. There may be a 60 or 70 percent chance of rain tomorrow, but it's rarely 100 percent. And, sometimes, even the Chicago Cubs win the World Series.So why is it that security practitioners often treat their threat environment as if it's black or white, rather than a spectrum of possible states or probable outcomes — even when this binary view diminishes the quality of their comprehension and decision-making and thus jeopardizes their actual security?To read this article in full or to leave a comment, please click here

Top 5 Reasons IoT projects fail

If you’re doing an Internet of Things deployment, prepare for failure. That’s the overarching takeaway from a survey Cisco conducted of more than 1,800 IT leaders in the U.S. and U.K.Up to 60% of IoT projects that respondents started stalled at the proof of concept phase, Cisco found. Just 26% of respondents said they had what they considered a successful IoT deployment. So where do IoT projects go south?+MORE AT NETWORK WORLD: Cisco: Secure IoT networks, not the devices +To read this article in full or to leave a comment, please click here

IDG Contributor Network: Machine learning: Are we there yet?

In my recent blogs, I have written about automation tying the network to other domains of IT, and how it’s a capability available today that you should start using.Machine learning is another hot topic. While the timeline is several years out for many machine learning applications in networking, it has the potential to be one of those rare technologies that comes along every few decades and fundamentally transforms how networks run.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Machine learning: Are we there yet?

In my recent blogs, I have written about automation tying the network to other domains of IT, and how it’s a capability available today that you should start using.Machine learning is another hot topic. While the timeline is several years out for many machine learning applications in networking, it has the potential to be one of those rare technologies that comes along every few decades and fundamentally transforms how networks run.To read this article in full or to leave a comment, please click here

Hackers can use malicious subtitles to remotely take control of your device

Do you use Kodi, Popcorn Time, VLC or Stremio? Do you use subtitles while you watch? If so, then you need to update the platform as Check Point researchers revealed that not all subtitles are benign text files and hackers can remotely take control of any device running vulnerable software via malicious subtitles.The attack is not in the wild, since Check Point developed the proof of concept attack vector; however, with news of the attack vector and an estimated 200 million video players and streaming apps running vulnerable software, attackers might jump on the malicious subtitle wagon to gain remote access to victims’ systems.To read this article in full or to leave a comment, please click here

Hackers can use malicious subtitles to remotely take control of your device

Do you use Kodi, Popcorn Time, VLC or Stremio? Do you use subtitles while you watch? If so, then you need to update the platform as Check Point researchers revealed that not all subtitles are benign text files and hackers can remotely take control of any device running vulnerable software via malicious subtitles.The attack is not in the wild, since Check Point developed the proof of concept attack vector; however, with news of the attack vector and an estimated 200 million video players and streaming apps running vulnerable software, attackers might jump on the malicious subtitle wagon to gain remote access to victims’ systems.To read this article in full or to leave a comment, please click here

Internet Society Deeply Concerned About Internet Blocking in Venezuela

The Internet Society is deeply concerned with the increase of Internet blocking and recent reports of growing content surveillance on the Internet in Venezuela. 

On May 13th, Venezuela issued the Presidential Decree no. 2849, which has declared an State of Exception and Emergency, enforced immediately for the period of 60 days, extending a pre existing State of Exception and Emergency in the country. 

According to the Official Gazette publication, the purpose of this decree is to adopt urgent, severe, exceptional and needed measures to ensure people's rights, to preserve the internal order and access to goods, services, food, medicine and other essentials for life.  

Sebastian Bellagamba

IDG Contributor Network: PureSec picks up investment because serverless is exciting

While in Israel late last year, I caught up with Shaked Zin and Avi Shulman, co-founders of security company PureSec. PureSec was in a bit of a conundrum. It was doing important work but in a space that was still nascent: serverless computing. As such, it was having a hard time both articulating its value proposition and getting investors to understand and commit to their story.I found this conundrum interesting. Serverless computing is, after all, pretty high on the hype cycle. Ever since Amazon Web Services (AWS) introduced the notion of serverless via its Lambda offering a few years ago, all vendors have been rushing to commercialize their own serverless offering.To read this article in full or to leave a comment, please click here

PureSec picks up investment because serverless is exciting

While in Israel late last year, I caught up with Shaked Zin and Avi Shulman, co-founders of security company PureSec. PureSec was in a bit of a conundrum. It was doing important work but in a space that was still nascent: serverless computing. As such, it was having a hard time both articulating its value proposition and getting investors to understand and commit to their story.I found this conundrum interesting. Serverless computing is, after all, pretty high on the hype cycle. Ever since Amazon Web Services (AWS) introduced the notion of serverless via its Lambda offering a few years ago, all vendors have been rushing to commercialize their own serverless offering.To read this article in full or to leave a comment, please click here