Archive

Category Archives for "Networking"

U.S. military wants white-hat hackers to target its cyber security systems

The U.S. military, which continues its interest in bug bounty programs as a way to improve cybersecurity, is launching a new contest next month.Called “Hack the Air Force,” the new program will put certain of the branch’s Web sites up as targets for a set of international hackers who have been vetted by HackerOne, which is running the program.+More on Network World: IBM: Financial services industry bombarded by malware, security threats+To read this article in full or to leave a comment, please click here

U.S. military wants white-hat hackers to target its cyber security systems

The U.S. military, which continues its interest in bug bounty programs as a way to improve cybersecurity, is launching a new contest next month.Called “Hack the Air Force,” the new program will put certain of the branch’s Web sites up as targets for a set of international hackers who have been vetted by HackerOne, which is running the program.+More on Network World: IBM: Financial services industry bombarded by malware, security threats+To read this article in full or to leave a comment, please click here

Apple fanboys cited as Merriam-Webster herds ‘sheeple’ into dictionary

“Wake up!” the good folks a Merriam-Webster just tweeted. “Sheeple is in the dictionary now.” Merriam-Webster via Twitter And while the induction of such casual slang is sure to offend some, none will likely take great umbrage than Apple zealots, whose zealotry is cited by the dictionary as an example of the proper use of the word.To read this article in full or to leave a comment, please click here

Apple fanboys cited as Merriam-Webster herds ‘sheeple’ into dictionary

“Wake up!” the good folks a Merriam-Webster just tweeted. “Sheeple is in the dictionary now.” Merriam-Webster via Twitter And while the induction of such casual slang is sure to offend some, none will likely take great umbrage than Apple zealots, whose zealotry is cited by the dictionary as an example of the proper use of the word.To read this article in full or to leave a comment, please click here

60% off SanDisk Extreme PRO 128GB USB 3.0 Flash Drive, Speeds Up To 260MB/s – Deal Alert

The SanDisk Extreme PRO USB 3.0 Flash Drive features a sizable 128GB of storage, and read speeds of up to 260MB/s lets you easily transfer a full-length movie in seconds. The sophisticated design and durable aluminum metal casing help to protect against every day wear and tear on the outside, while the included SanDisk SecureAccess software provides 128-bit AES file encryption and password protection on the inside for your private files. The SanDisk Extreme PRO USB 3.0 Flash Drive is backed with a lifetime limited warranty. It currently averages 4.6 out of 5 stars on Amazon from over 530 people (80% rate the full 5 stars: see reviews here), and its typical list price has been reduced generously to just $52.10. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Don’t Be My Guest

I’m interrupting my regularly scheduled musing about technology and networking to talk today about something that I’m increasingly seeing come across my communications channels. The growing market for people to “guest post” on blogs. Rather than continually point folks to my policies on this, I thought it might be good to break down why I choose to do what I do.

The Archive Of Tom

First and foremost, let me reiterate for the record: I do not accept guest posts on my site.

Note that this has nothing to do with your skills as a writer, your ability to create “compelling, fresh, and exciting content”, or your particular celebrity status as the CTO/CIO/COMGWTFBBQO of some hot, fresh, exciting new company. I’m sure if Kurt Vonnegut’s ghost or J.K. Rowling wanted to make a guest post on my blog, the answer would still be the same.

Why? Because this site is the archive of my thoughts. Because I want this to be an archive of my viewpoints on technology. I want people to know how I’ve grown and changed and come to love things like SDN over the years. What I don’t want is for people to need to Continue reading

IDG Contributor Network: Folks are fantasizing about Amazon’s Alexa

Humans are developing extreme emotional connections with their virtual assistants—so much so that about a quarter of regular users say they have sexual fantasies about those digital voice assistants.That’s according to new research by J. Walter Thompson and Mindshare (pdf).The virtual assistants include devices such as Amazon’s Alexa and Echo brands and Apple’s Siri smartphone virtual assistant. They’re used for giving verbal instructions to and consequently operating residential Internet of Things applications, playing music and reading the news out loud, among other things.To read this article in full or to leave a comment, please click here

PQ Show 113: All About DNS At IETF 98

Todays Priority Queue is all about DNS, including scale, security, privacy, and DDoS protection. Well also get into mechanisms for DNS authentication and operational issues. This episode was recorded live at IETF 98 with guest Tim Wicinski. The post PQ Show 113: All About DNS At IETF 98 appeared first on Packet Pushers.

Enterprise security technology consolidation

Look around the cybersecurity infrastructure at any enterprise organization, and here’s what you’ll see—dozens and dozens of cybersecurity tools from just as many vendors. Now this situation wasn’t planned; it just happened. Over the past 15 years, bad guys developed new cyber weapons to exploit IT vulnerabilities. And large organizations reacted to these new threats by purchasing and deploying new security controls and monitoring systems. This pattern continued over time, leading to today’s patchwork of security point tools. + Also on Network World: Is your company spending on the right security technologies? + So, what’s the problem? Point tools aren’t really designed to talk with one another, leaving human beings to bridge the communications, intelligence and technology gaps between them. Furthermore, each individual tool requires training, deployment, configuration and ongoing operational support. More tools, more needs.To read this article in full or to leave a comment, please click here

Enterprise security technology consolidation

Look around the cybersecurity infrastructure at any enterprise organization, and here’s what you’ll see—dozens and dozens of cybersecurity tools from just as many vendors. Now this situation wasn’t planned; it just happened. Over the past 15 years, bad guys developed new cyber weapons to exploit IT vulnerabilities. And large organizations reacted to these new threats by purchasing and deploying new security controls and monitoring systems. This pattern continued over time, leading to today’s patchwork of security point tools. + Also on Network World: Is your company spending on the right security technologies? + So, what’s the problem? Point tools aren’t really designed to talk with one another, leaving human beings to bridge the communications, intelligence and technology gaps between them. Furthermore, each individual tool requires training, deployment, configuration and ongoing operational support. More tools, more needs.To read this article in full or to leave a comment, please click here

IBM: Financial services industry bombarded by malware, security threats

The financial services industry is the target of a whopping 65% more targeted cyber-attacks than the average business, according to security watchers at IBM’s X Force.The number of financial services records breached skyrocketed 937% in 2016 to more than 200 million. Financial institutions were forced to defend against a 29 percent increase in the number of attacks from 2015, IBM stated.+More on Network World:  IBM: Tax-related spam up 6,000% since Dec.; Darkweb tactics net billions+To read this article in full or to leave a comment, please click here

IBM: Financial services industry bombarded by malware, security threats

The financial services industry is the target of a whopping 65% more targeted cyber-attacks than the average business, according to security watchers at IBM’s X Force.The number of financial services records breached skyrocketed 937% in 2016 to more than 200 million. Financial institutions were forced to defend against a 29 percent increase in the number of attacks from 2015, IBM stated.+More on Network World:  IBM: Tax-related spam up 6,000% since Dec.; Darkweb tactics net billions+To read this article in full or to leave a comment, please click here