Archive

Category Archives for "Networking"

Snowden’s ex-boss offers tips on stopping insider threats

Steven Bay, a former defense contractor, knows a thing or two about insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the U.S. National Security Agency.Recalling the day he learned Snowden had been behind the NSA leaks back in June 2013, Bay said he received texts about the breaking news while in a leadership meeting at a church. The first text said "Sorry man, looks like your worst nightmare came true."To read this article in full or to leave a comment, please click here

Snowden’s ex-boss offers tips on stopping insider threats

Steven Bay, a former defense contractor, knows a thing or two about insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the U.S. National Security Agency. Recalling the day he learned Snowden had been behind the NSA leaks back in June 2013, Bay said he received texts about the breaking news while in a leadership meeting at a church. The first text said "Sorry man, looks like your worst nightmare came true."To read this article in full or to leave a comment, please click here

Build candidate personas to help you hire the right talent

If you're trying to improve your ability to attract top talent without sacrificing your commitment to diversity and inclusion, consider using a "candidate persona" strategy.The concept is similar to creating "buyer personas" in marketing, says Maren Hogan, CEO of Red Branch Media, in a session at SourceCon, last week in Anaheim, Calif."A candidate persona is a fictionalized representation of your ideal hire for a specific role. This should mostly be based on data, but it also requires a bit of intuition and even some guesswork. Think about who you are looking for; who is this person? What do they do with their days? What are their primary concerns, inside and outside of work? What hobbies and activities are important to them? What's keeping them up at night?" Hogan says.To read this article in full or to leave a comment, please click here

FCC clears path for carriers to block more robocalls

The FCC this morning voted 3-0 to give carriers new regulatory cover to combat annoying and oftentimes fraudulent robocalls. The decision backs an ongoing effort begun last year with the establishment of a special government/industry task force.FCC Chairman Ajit Pai called today’s Notice of Proposed Rulemaking “an important first step in ending the scourge of robocalls.”Specifically, the new rules would assure carriers that they are allowed to block calls originating from unassigned numbers and other obvious attempts at fraud such as numbers using 411 or 911 as an area code.In October the FCC reported that a trial of one such anti-spoofing measure cut IRS scam robocalls by 90 percent.To read this article in full or to leave a comment, please click here

Webinar Q&A: Introducing Docker Enterprise Edition (EE)

A few weeks ago we announced Docker Enterprise Edition (EE), the trusted, certified and supported container platform. Docker EE enables IT teams to establish a Containers as a Service (CaaS) environment to converge legacy, ISV and microservices apps into a single software supply chain that is flexible, secure and infrastructure independent. With a built in orchestration architecture (swarm mode) Docker EE allows app teams to compose and schedule simple to complex apps to drive their digital transformation initiatives.

On March 14th we hosted a live webinar to provide an overview and demonstration of Docker EE. View the recorded session below and read through some of the most popular questions.

Frequently Asked Questions

Q: How is Docker EE licensed?

A: Docker EE is licensed per node. A node is an instance running on a bare metal or virtual server. For more details visit www.docker.com/pricing

Q: Is Google Cloud also one of your certified infrastructure partners?

A: Docker EE is available today for both Azure and AWS. Google Cloud is currently offered as a private beta with Docker Community Edition. Learn more in this blog post and sign up at https://beta.docker.com 

Q: What technology Continue reading

Now WikiLeaks threatens to disclose software vulnerabilities

Earlier this month, the notorious info leaker WikiLeaks published a batch of documents from the CIA detailing how the CIA has developed several tools to crack, break into or infect all kinds of devices—from PCs to Smart TVs—even if they are not connected to the internet. At the time, WikiLeaks leader Julian Assange promised that the site would work with the affected tech companies to give them exclusive access to the technical details of those exploits and would not go public with the exploits and back doors. However, it wasn't until this week that WikiLeaks got in contact with the listed tech companies, such as Microsoft, Apple and Google, according to Motherboard, the tech site run by Vice. Citing unnamed sources familiar with the matter, Motherboard said WikiLeaks has made demands on the initial contact with firms but didn't share any of the alleged CIA codes. To read this article in full or to leave a comment, please click here

Now WikiLeaks threatens to disclose software vulnerabilities

Earlier this month, the notorious info leaker WikiLeaks published a batch of documents from the CIA detailing how the CIA has developed several tools to crack, break into or infect all kinds of devices—from PCs to Smart TVs—even if they are not connected to the internet. At the time, WikiLeaks leader Julian Assange promised that the site would work with the affected tech companies to give them exclusive access to the technical details of those exploits and would not go public with the exploits and back doors. However, it wasn't until this week that WikiLeaks got in contact with the listed tech companies, such as Microsoft, Apple and Google, according to Motherboard, the tech site run by Vice. Citing unnamed sources familiar with the matter, Motherboard said WikiLeaks has made demands on the initial contact with firms but didn't share any of the alleged CIA codes. To read this article in full or to leave a comment, please click here

FTC warns on “Can you hear me now” robocall: Hang up!

The Federal Trade Commission this week issued a warning about the irritating and illegal “Can you hear me now?” robocall scam making the rounds on phones across the country. The FTC says it has received hundreds of complaints on the calls which could end up being part of a scam to get your money. +More on Network World: U.S. Marshals warn against dual phone scams+ The Better Business Bureau described the scam earlier this year: “By replying ‘yes,’  ‘sure,’ or other agreeable response, the scammer records the call and uses that sound bite to authorize unwanted charges to the scammers benefit. “It seems like an innocent question, but it can cause undue financial burdens and stress. The scam caller may already have your financial information, which is how they authorize a payment and, if you dispute a charge, the scammer has doctored the recording to make it seems as though you agreed to it.”To read this article in full or to leave a comment, please click here

FTC warns on “Can you hear me now” robocall: Hang up!

The Federal Trade Commission this week issued a warning about the irritating and illegal “Can you hear me now?” robocall scam making the rounds on phones across the country. The FTC says it has received hundreds of complaints on the calls which could end up being part of a scam to get your money. +More on Network World: U.S. Marshals warn against dual phone scams+ The Better Business Bureau described the scam earlier this year: “By replying ‘yes,’  ‘sure,’ or other agreeable response, the scammer records the call and uses that sound bite to authorize unwanted charges to the scammers benefit. “It seems like an innocent question, but it can cause undue financial burdens and stress. The scam caller may already have your financial information, which is how they authorize a payment and, if you dispute a charge, the scammer has doctored the recording to make it seems as though you agreed to it.”To read this article in full or to leave a comment, please click here

Cisco security researcher: Ransomware crowd big on customer service

Cisco Senior Security Researcher Brad Antoniewicz often gets asked whether those who take people’s computers hostage with ransomware actually hold up their end of the bargain and decrypt files when victims pay by bitcoin. “They’re in it to make money…Good customer service is important to these people,” he said, and not at all tongue in cheek, during his lunchtime address on the opening day of SecureWorld Boston this week. Antoniewicz, sporting a RUN DNS t-shirt reflecting his position with the Cisco Umbrella (formerly OpenDNS) team, dove into the topic of ransomware variants like Cerber as part of a broader talk on “An Anatomy of an Attack” and the elaborate ecosystem behind cyberattacks. To read this article in full or to leave a comment, please click here

Cisco security researcher: Ransomware crowd big on customer service

Cisco Senior Security Researcher Brad Antoniewicz often gets asked whether those who take people’s computers hostage with ransomware actually hold up their end of the bargain and decrypt files when victims pay by bitcoin. “They’re in it to make money…Good customer service is important to these people,” he said, and not at all tongue in cheek, during his lunchtime address on the opening day of SecureWorld Boston this week. Antoniewicz, sporting a RUN DNS t-shirt reflecting his position with the Cisco Umbrella (formerly OpenDNS) team, dove into the topic of ransomware variants like Cerber as part of a broader talk on “An Anatomy of an Attack” and the elaborate ecosystem behind cyberattacks. To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 reasons to hire a cognitive developer in 2017

Help Wanted: Seeking Cognitive DeveloperIf the history of technology has taught us anything, it’s that change is constant. We’ve seen it with the birth of the computer, the internet, the cloud and now artificial intelligence (AI).As technology evolves, so does the role of developers who have become embedded in the fabric of these changing technologies. The developer of today is very different than the developer of three years ago and perhaps unrecognizable to the developer a decade ago. Driving the democratization of technology, developers are constantly evolving to continuously innovate and move with changing paradigms.To read this article in full or to leave a comment, please click here

53% off Jaybird X2 Sport Wireless Bluetooth Headphones – Deal Alert

With a regular list price of $149.99, the current discount makes the Jaybird X2 Sport is now available with a 53% discount for this deal. Features include: Premium Bluetooth Audio For Skip-Free Music Outdoors 8 Hours of Music + Calls With Complete Remote Controls Secure Over/Under-Ear Fit Options Lifetime Sweat proof Warranty Includes Comply Premium Sport Memory Foam Ear Tips, Patented Secure-Fit Ear Fins, Friction-Fit Silicone Sport Carrying Case, Silicone Ear Tips, Charging Cable & Cord Management Clips. Jump to Amazon now for additional details, and to explore buying options.To read this article in full or to leave a comment, please click here

Wozniak discusses robots, design, and Apple’s origins

More than 40 years after founding Apple Computer, Steve Wozniak has a lot to say about the early days of the world's richest company -- and about technology, learning, and being a born engineer.On stage at the IEEE TechIgnite conference in Burlingame, California, on Wednesday, he gave a glimpse into how a tech legend thinks.On open source In the early Seventies, Wozniak read about phone phreaking, in which "phreakers" made free phone calls by using electronics to mimic the tones used for dialing each number. To learn how to do it, he went to the only place he knew that had books and magazines about computers: The Stanford Linear Accelerator Center. He went on a Sunday and walked right in. "The smartest people in the world don't lock doors," Wozniak said.To read this article in full or to leave a comment, please click here

CW@50: Data storage goes from $1M to 2 cents per gigabyte (+video)

When Computerworld was founded in 1967, a 1-megabyte hard drive would have set you back by $1 million.Today, that same megabyte of capacity on a hard disk drive (HDD) costs (about two cents.Through those five decades, data storage was seen as little more than a support technology, when in actuality has always been one of five tech pillars -- like processors and software -- underpinning our modern computer systems, said Owen Melroy, vice president of Media Components at Western Digital Corp. (WD).To read this article in full or to leave a comment, please click here

10 alarming examples of AI gone wild

Going rogue! 10 scary examples of AI gone wildImage by geralt via PixabayScience fiction is lousy with tales of artificial intelligence run amok. There's HAL 9000, of course, and the nefarious Skynet system from the "Terminator" films. Last year, the sinister AI Ultron came this close to defeating the Avengers, and right now the hottest show on TV is HBO's "Westworld," concerning the future of humans and self-aware AI.To read this article in full or to leave a comment, please click here

Enterprises misaligning security budget, priorities

Imagine paying for a small lock on your house every year. Burglars continue to break in despite what you think is a strong security deterrent. You spend the same amount every year on this inadequate security despite the different products on the market that promise to protect your home better.To read this article in full or to leave a comment, please click here(Insider Story)

How to stop insider threats

Watch what leaves the officeImage by ThinkstockEmployee turnover is common, as is the practice of employees taking sensitive and confidential data with them when they leave, particularly data that they were involved in generating. This creates a significant risk for employers whose data was misappropriated, resulting in potential data breaches that can trigger regulatory actions or legal actions, as well as a variety of other consequences. Most employers are not adequately prepared to deal with the aftermath of employee data theft and many do not take the steps necessary to mitigate these risks before they occur.To read this article in full or to leave a comment, please click here