Archive

Category Archives for "Networking"

IDG Contributor Network: MasterCard puts a finger on fraud

Most credit card verification systems only verify whether the card is valid and not if the presenter is the authorized cardholder. MasterCard intends to address that with its newly introduced card with a built-in fingerprint sensor.This new MasterCard gives customers the option of using a single digit rather than a PIN. It’s a very impressive development, particularly since it works with existing chip readers.+ Also on Network World: Google’s Trust API: Bye-bye passwords, hello biometrics? + The card gives new meaning to the title “cardholder” as the customer must physically hold the card during the transaction. There’s a fingerprint sensor on the face of the card that syphons enough power from the chip reader to read and validate a fingerprint. If dirt, sweat or other factors prevent validation, the transaction can be completed with a PIN.To read this article in full or to leave a comment, please click here

One the ‘net: The Network Collective and Choosing a Routing Protocol

The Network Collective is a new and very interesting video cast of various people sitting around a virtual table talking about topics of interest to network engineers. I was on the second episode last night, and the video is already (!) posted this morning. You should definitely watch this one!

In episode 2 our panel discusses some key differences between routing protocols and the details that should be considered before choosing to implement one over another. Is there any difference between IGP routing protocols at this point? When does it make sense to run BGP in an enterprise network? Is IS-IS an old and decaying protocol, or something you should viably consider? Russ White, Kevin Myers, and the co-hosts of Network Collective tackle these questions and more.

The post One the ‘net: The Network Collective and Choosing a Routing Protocol appeared first on rule 11 reader.

29% off Cooler Master Hyper 212 EVO CPU Cooler with 120mm PWM Fan – Deal Alert

The Hyper 212 EVO now features four Cooler Master patented Continuous Direct Contact (CDC) heat pipes that are tightly packed into a flat array on the CPU Cooler base. This acts as a virtual vapor chamber that dissipates a large amount of heat. The aluminum fin structure has been optimized to provide the perfect performance balance between high and low speed fan operations.  The fan averages 4.4 out of 5 stars from over 7,600 people on Amazon (read reviews here), where its typical list price of $34.99 has been reduced 29% to just $24.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by different groups of varying skills and expertise, all following instructions provided by one malicious actor, McAfee researchers have found.Researchers at McAfee Strategic Intelligence believe the 2012 Shamoon attacks against Saudi Arabia’s state-run oil company Saudi Aramco and Qatari natural gas company RasGas, the attacks last November against Saudi organizations, and these latest attacks are all the work of hacker groups supported and coordinated by a single actor, and not the efforts of multiple gangs operating independently, said McAfee principal engineer Christiaan Beek and McAfee chief scientist Raj Samani. To read this article in full or to leave a comment, please click here

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by different groups of varying skills and expertise, all following instructions provided by one malicious actor, McAfee researchers have found.Researchers at McAfee Strategic Intelligence believe the 2012 Shamoon attacks against Saudi Arabia’s state-run oil company Saudi Aramco and Qatari natural gas company RasGas, the attacks last November against Saudi organizations, and these latest attacks are all the work of hacker groups supported and coordinated by a single actor, and not the efforts of multiple gangs operating independently, said McAfee principal engineer Christiaan Beek and McAfee chief scientist Raj Samani. To read this article in full or to leave a comment, please click here

Report: Top 25 IT security products

Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated products in security categories such as cloud security, firewalls, security information and event management (SIEM), application security and internet of things (IoT) security.IT Central Station selected the product leaders in each security category. The report uses a scoring methodology based on a combination of buyer interest, the number of reviews (at least 10), and the average rating in those reviews.To read this article in full or to leave a comment, please click here(Insider Story)

Security-as-a-service model gains traction

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here

Security-as-a-service model gains traction

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here

Report: Top 25 IT security products

Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated products in security categories such as cloud security, firewalls, security information and event management (SIEM), application security and internet of things (IoT) security.To read this article in full or to leave a comment, please click here(Insider Story)

Security-as-a-service model gains traction

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here

Google becomes first foreign internet company to launch service in Cuba

Google servers inside Cuba are now live on the internet, marking a major milestone in the country's communications evolution and promising faster access to Google's services for Cuban users.The computers are part of Google's global network of caching servers, which store frequently requested content locally so it doesn't have to be accessed over long distances.That speeds up access in any country but is particularly important in a nation like Cuba, which has relatively low connectivity to the rest of the world.Cuba is connected to the rest of the internet almost exclusively via the ALBA-1 submarine cable, which runs from the island to Venezuela, said Doug Madory, director of internet analysis at Dyn Research. Dyn was first to spot the emergence of the Google caching servers on the internet.To read this article in full or to leave a comment, please click here

Google becomes first foreign internet company to launch service in Cuba

Google servers inside Cuba are now live on the internet, marking a major milestone in the country's communications evolution and promising faster access to Google's services for Cuban users.The computers are part of Google's global network of caching servers, which store frequently requested content locally so it doesn't have to be accessed over long distances.That speeds up access in any country but is particularly important in a nation like Cuba, which has relatively low connectivity to the rest of the world.Cuba is connected to the rest of the internet almost exclusively via the ALBA-1 submarine cable, which runs from the island to Venezuela, said Doug Madory, director of internet analysis at Dyn Research. Dyn was first to spot the emergence of the Google caching servers on the internet.To read this article in full or to leave a comment, please click here

Response: Don’t believe the non-programming hype – Paul’s blog

Paul Gear has a great response to a recent Packet Pushers Weekly episode on programming/automation and this particular view that I agree with: Programming isn’t hype; programming is a fundamental IT skill.  If you don’t understand the basics of computer architecture (e.g. CPU instruction pointers, registers, RAM, stacks, cache, etc.) and how to create instructions […]

The post Response: Don’t believe the non-programming hype – Paul’s blog appeared first on EtherealMind.

IDG Contributor Network: The hybrid evolution of IT

It’s a great time to be in information technology.While that statement is true, not everyone clearly understands why (or perhaps has the fortitude to make it so). In the face of a massive movement to public cloud—by 2020, 92 percent of world’s workloads will be in cloud, with 68 percent in public and 32 percent in private—many in IT feel their value in the workplace eroding along with their identity.That feeling doesn’t need to be reality. Businesses are changing the way they operate and are transforming to leverage IT more strategically. IT has a real opportunity to lead this transformation, not let the transformation happen to them.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The hybrid evolution of IT

It’s a great time to be in information technology.While that statement is true, not everyone clearly understands why (or perhaps has the fortitude to make it so). In the face of a massive movement to public cloud—by 2020, 92 percent of world’s workloads will be in cloud, with 68 percent in public and 32 percent in private—many in IT feel their value in the workplace eroding along with their identity.That feeling doesn’t need to be reality. Businesses are changing the way they operate and are transforming to leverage IT more strategically. IT has a real opportunity to lead this transformation, not let the transformation happen to them.To read this article in full or to leave a comment, please click here

Surprisingly few tech insights in Steve Ballmer’s USAFacts data trove

Former Microsoft CEO Steve Ballmer's USAFacts project, an ambitious and sometimes overwhelming repository of data about local to state to federal U.S. government spending and outcomes that was launched on Tax Day, is surprisingly light on technology-related data.Not that Ballmer is obligated to spend his post-Microsoft life focused on technology —indeed, he's mainly been known for his purchase of the NBA's Los Angeles Clippers in recent years — but given his background I expected that I might find more tech-related nuggets in this graphically-pleasing data trove that's been three years in the making. Interested in the possibilities for data journalism stories spun from USAFacts, I made an inquiry to the outfit's media relations contact and will update this post if I hear back from them with any clarification on possible additions of such techie numbers.To read this article in full or to leave a comment, please click here