Archive

Category Archives for "Networking"

Organizations need strategic and proactive threat intelligence programs

In 2015, ESG did an in-depth research project on cyber threat intelligence usage at enterprise organizations (i.e. more than 1,000 employees). The goal of this project was to determine how large firms were using threat intelligence, what challenges they faced, how they were addressing these challenges and what their strategies were moving forward.The research revealed that many threat intelligence programs were relatively immature—40 percent of threat intelligence programs had been in place fewer than two years at that time. Cybersecurity professionals were also asked to identify the top objectives for their organization’s threat intelligence program. The top results were as follows:To read this article in full or to leave a comment, please click here

Organizations need strategic and proactive threat intelligence programs

In 2015, ESG did an in-depth research project on cyber threat intelligence usage at enterprise organizations (i.e. more than 1,000 employees). The goal of this project was to determine how large firms were using threat intelligence, what challenges they faced, how they were addressing these challenges and what their strategies were moving forward.The research revealed that many threat intelligence programs were relatively immature—40 percent of threat intelligence programs had been in place fewer than two years at that time. Cybersecurity professionals were also asked to identify the top objectives for their organization’s threat intelligence program. The top results were as follows:To read this article in full or to leave a comment, please click here

Linux Action Show ends after 10-year run

What follows is all about Linux podcasts—something I’ve spent a fairly ridiculous amount of time on over the last decade or so. So, this post is basically inside baseball—for Linux podcasts. You’ve been warned.--------------------------------------------------This past Sunday, Jupiter Broadcasting announced the Linux Action Show—one of the longest-running podcasts in the Linux world, which has aired almost continuously since June 10, 2006—is coming to an end and closing down production.To read this article in full or to leave a comment, please click here

Microsoft’s Docs.com is sharing dangerously sensitive personal files and information

If you use Microsoft’s Docs.com to store personal documents, stop reading this and make sure you aren’t inadvertently leaking your private information to the world.Microsoft sets any documents uploaded to the document sharing site as public by default—though it appears that many users aren’t aware of it. That means anyone can search Docs.com for sensitive personal information that wasn’t manually set private. PCWorld found social security numbers, health insurance ID numbers, bank records, job applications, personal contact details, legal correspondence, and drivers license numbers with just a few minutes of searching.To read this article in full or to leave a comment, please click here

Microsoft’s Docs.com is sharing dangerously sensitive personal files and information

If you use Microsoft’s Docs.com to store personal documents, stop reading this and make sure you aren’t inadvertently leaking your private information to the world.Microsoft sets any documents uploaded to the document sharing site as public by default—though it appears that many users aren’t aware of it. That means anyone can search Docs.com for sensitive personal information that wasn’t manually set private. PCWorld found social security numbers, health insurance ID numbers, bank records, job applications, personal contact details, legal correspondence, and drivers license numbers with just a few minutes of searching.To read this article in full or to leave a comment, please click here

Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Earlier this year Fortinet hired its first chief information security officer (CISO). The timing makes sense, as the company has grown into a leading security vendor with an integrated, security fabric vision that few competitors can match.As Fortinet continues to expand its presence in the federal and critical infrastructure markets, CISO Philip Quade brings the credentials and background needed to help lead the strategy. Prior to joining Fortinet, Quade was the NSA director’s special assistant for cyber and chief of the NSA Cyber Task Force. Before that, he was chief operating officer of the Information Assurance Directorate at the NSA.I recently talked with Quade regarding his new role and the challenges the United States and businesses in general face with respect to security.To read this article in full or to leave a comment, please click here

Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Earlier this year Fortinet hired its first chief information security officer (CISO). The timing makes sense, as the company has grown into a leading security vendor with an integrated, security fabric vision that few competitors can match.As Fortinet continues to expand its presence in the federal and critical infrastructure markets, CISO Philip Quade brings the credentials and background needed to help lead the strategy. Prior to joining Fortinet, Quade was the NSA director’s special assistant for cyber and chief of the NSA Cyber Task Force. Before that, he was chief operating officer of the Information Assurance Directorate at the NSA.I recently talked with Quade regarding his new role and the challenges the United States and businesses in general face with respect to security.To read this article in full or to leave a comment, please click here

Hitachi reveals new AI for real-time identity detection and tracking

Hitachi announced it has developed a new image analysis system that uses artificial intelligence (AI) for real-time people tracking and detection. The AI can detect an individual in real time by combining over 100 external characteristics and then track that person using wide-area security and surveillance systems.Systems that capture facial images and color of clothing have previously been deployed in public areas, but according to Hitachi, it is difficult for security staff to find and track a person based on an eyewitness account or poor surveillance camera footage.To read this article in full or to leave a comment, please click here

Hitachi reveals new AI for real-time identity detection and tracking

Hitachi announced it has developed a new image analysis system that uses artificial intelligence (AI) for real-time people tracking and detection. The AI can detect an individual in real time by combining over 100 external characteristics and then track that person using wide-area security and surveillance systems.Systems that capture facial images and color of clothing have previously been deployed in public areas, but according to Hitachi, it is difficult for security staff to find and track a person based on an eyewitness account or poor surveillance camera footage.To read this article in full or to leave a comment, please click here

21% off Roku Premiere+ Streaming Media Player – Deal Alert

Get powerful performance, stunning 4K and HDR picture quality, and an advanced remote for an amazing streaming experience. The new Roku Premiere+ is for HD & 4K Ultra HD TVs. It delivers ultra-smooth quad-core streaming, brilliant 4K resolution at 60fps, vibrant HDR color, access to 450,000+ movies and TV episodes across 4,500+ paid or free channels, and a handy point anywhere remote.  The Roku Premiere+ list price has been reduced a significant 21% to $79. See the deal now on Amazon.To read this article in full or to leave a comment, please click here

46% off HDMI Female to Female Coupler 2-Pack, Gold Plated High Speed Adapter – Deal Alert

Here's an adapter that's always good to have on hand. Pop one of them on the end of an HDMI cable and extend your back-of-the-tv HDMI port around front where it's easier to access. Or use them to couple multiple HDMI cables together for extended reach. Supports 3D and 4k signals. The list price of $10.99 has been reduced 46% to just $5.89 for the two-pack. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

The Questions We Ask of Networks

The Questions We Ask of Networks Two weeks ago, a blog entitled Towards Machine Learning in Networking: Benefits Begin Now discussed machine learning in networking, and was based on a podcast given on the same topic. It was fun to have some discussion about what the next steps are, and how close we may be to networks that “machine learn” (ML)... Read more →

15% off Xbox One S 1TB Console, Halo Wars 2 Bundle – Deal Alert

Real-time strategy makes an explosive return to the Halo universe with Halo Wars 2: Ultimate Edition, included as a full game download for Xbox One and Windows 10. This bundle also comes with the Halo Wars 2: Season Pass, featuring six months of additional content, plus Halo Wars: Definitive Edition, an enhanced version of the real-time strategy classic-all as full game downloads for Xbox One and Windows 10 PC. Watch 4K Blu-ray movies and stream Netflix in 4K Ultra HD. Experience richer, more luminous colors in games and video with HDR. And play a growing library of Xbox 360 games with advanced features like Game DVR and in-home streaming to Windows 10. The bundle's price has been discounted, for now, to $299 on Amazon. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

9 lies programmers tell themselves

Programmers have pride with good reason. No one else has the power to reach into a database and change reality. The more the world relies on computers to define how the world works, the more powerful coders become.Alas, pride goeth before the fall. The power we share is very real, but it’s far from absolute and it’s often hollow. In fact, it may always be hollow because there is no perfect piece of code. Sometimes we cross our fingers and set limits because computers make mistakes. Computers too can be fallible, which we all know from too much firsthand experience.[ Find out how to get ahead with our career development guide for developers. | The art of programming is changing rapidly. We help you navigate what’s hot in programming and what’s going cold. | Keep up with hot topics in programming with InfoWorld’s App Dev Report newsletter. ] Of course, many problems stem from assumptions we programmers make that simply aren’t correct. They’re usually sort of true some of the time, but that’s not the same as being true all of the time. As Mark Twain supposedly said, “It ain’t what you don’t know that gets you into Continue reading

6 soft skills employers should be looking for in tech talent

Forget experience and hard skills -- tomorrow's best talent will need soft skills, and it's fact that sourcing and recruiting pros need to be prepared to address."From our own LinkedIn research last May, we know that, of 291 hiring managers we surveyed, their employers struggle to find candidates with the right soft skills for 59 percent of their open jobs, and 58 percent said the lack of soft skills among candidates was 'limiting their company's productivity,'" says Jennifer Shappley, senior director of talent acquisition at LinkedIn at a presentation at SourceCon, held earlier this month in Anaheim, Calif.To read this article in full or to leave a comment, please click here

SDN solves a lot of network problems, but security isn’t one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.That's a lot of power, yet developers still don't have security at the forefront of their minds when building SDN products, which is why there are weaknesses in SDN that can compromise enterprise security.To read this article in full or to leave a comment, please click here

SDN solves a lot of network problems, but security isn’t one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.That's a lot of power, yet developers still don't have security at the forefront of their minds when building SDN products, which is why there are weaknesses in SDN that can compromise enterprise security.To read this article in full or to leave a comment, please click here

SDN solves a lot of network problems, but security isn’t one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.That's a lot of power, yet developers still don't have security at the forefront of their minds when building SDN products, which is why there are weaknesses in SDN that can compromise enterprise security.To read this article in full or to leave a comment, please click here