Archive

Category Archives for "Networking"

IDG Contributor Network: Smarter authentication makes mobile experiences more secure, user friendly

To make our lives easier, digital experiences have become much more interconnected and the volume of personal data captured in the cloud is growing exponentially. While these trends make us more productive, they can also make security breaches much more damaging. Once a hacker gains access to one aspect of your digital life, he can easily reach across multiple applications and accounts, laying a path of destruction and heartache.Today’s mobile and digital experiences need authentication strategies that keep up with the constantly changing digital ecosystem, and simple passwords are not enough.Authentication must be fast, easy to use Multifactor authentication strategies are growing in popularity, but the tradeoff of usability and security is a constant balancing act. If authentication solutions are not simple, quick and easy, users will find ways around them. And if they are not secure, hackers will quickly exploit weaknesses. Sophisticated smart authentication strategies are coming to market that are less visible and easier to use than messaging-based two-factor authentication approaches or biometrics. Approaches such as behavioral biometrics and adaptive authentication are leveraging data and sophisticated algorithms to create more secure and easier-to-use experiences.To read this article in full or to leave a comment, please Continue reading

IDG Contributor Network: Smarter authentication makes mobile experiences more secure, user friendly

To make our lives easier, digital experiences have become much more interconnected and the volume of personal data captured in the cloud is growing exponentially. While these trends make us more productive, they can also make security breaches much more damaging. Once a hacker gains access to one aspect of your digital life, he can easily reach across multiple applications and accounts, laying a path of destruction and heartache.Today’s mobile and digital experiences need authentication strategies that keep up with the constantly changing digital ecosystem, and simple passwords are not enough.Authentication must be fast, easy to use Multifactor authentication strategies are growing in popularity, but the tradeoff of usability and security is a constant balancing act. If authentication solutions are not simple, quick and easy, users will find ways around them. And if they are not secure, hackers will quickly exploit weaknesses. Sophisticated smart authentication strategies are coming to market that are less visible and easier to use than messaging-based two-factor authentication approaches or biometrics. Approaches such as behavioral biometrics and adaptive authentication are leveraging data and sophisticated algorithms to create more secure and easier-to-use experiences.To read this article in full or to leave a comment, please Continue reading

Trump budget would fund border wall, but slash science and research

President Donald Trump's federal budget outline released Thursday represents a major shift in U.S. priorities. It would increase defense spending, boost immigration enforcement and include in seed money for a wall along the southern border.It does all of that, in part, by cutting science funding.[ Further reading: The march toward exascale computers ] Science and technology groups are warning that U.S. leadership will suffer if the budget, which would cover the fiscal year that begins Oct. 1, is adopted.To read this article in full or to leave a comment, please click here

31% off Luma 3-Piece Whole Home Mesh WiFi System – Deal Alert

Regardless of your home’s size or shape, these 3 powerful Luma devices work together to create an extremely fast, ultra-secure surround WiFi network that’s customized for your home. No more fiddling with extra WiFi extenders to manage dead spots and weak zones. Luma puts you in control. With a few simple taps, you can pause the internet, filter what your kids are looking at online, or set house rules for your network. Luma also secures your devices and neutralizes threats, keeping you in control of your network. The Luma whole house WiFi system averages 4 out of 5 stars from over 1,100 people on Amazon (read recent reviews), where its typical list price of $399 has been reduced 31% to $275.95. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

31% off Luma 3-Piece Whole Home Mesh WiFi System – Deal Alert

Regardless of your home’s size or shape, these 3 powerful Luma devices work together to create an extremely fast, ultra-secure surround WiFi network that’s customized for your home. No more fiddling with extra WiFi extenders to manage dead spots and weak zones. Luma puts you in control. With a few simple taps, you can pause the internet, filter what your kids are looking at online, or set house rules for your network. Luma also secures your devices and neutralizes threats, keeping you in control of your network. The Luma whole house WiFi system averages 4 out of 5 stars from over 1,100 people on Amazon (read recent reviews), where its typical list price of $399 has been reduced 31% to $275.95. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Adobe Reader, Edge, Safari, and Ubuntu fall during first day at Pwn2Own

Bug hunters have gathered again to test their skills against some of the most popular and mature software programs during the Pwn2Own hacking contest. During the first day, they successfully demonstrated exploits against Microsoft Edge, Apple's Safari, Adobe Reader, and Ubuntu Desktop.The Pwn2Own contest runs every year during the CanSecWest security conference in Vancouver, Canada. It's organized and sponsored by the Zero Day Initiative (ZDI), an exploit acquisition program operated by Trend Micro after its acquisition of TippingPoint.This year the contest has a prize pool of US$1 million for exploits in five categories: virtual machines (VMware Workstation and Microsoft Hyper-V); web browser and plugins (Microsoft Edge, Google Chrome, Mozilla Firefox, Apple Safari, and Flash Player running in Edge); local escalation of privilege (Windows, macOS, and Ubuntu Desktop); enterprise applications (Adobe Reader, Word, Excel, and PowerPoint) and server side (Apache Web Server on Ubuntu Server).To read this article in full or to leave a comment, please click here

Adobe Reader, Edge, Safari, and Ubuntu fall during first day at Pwn2Own

Bug hunters have gathered again to test their skills against some of the most popular and mature software programs during the Pwn2Own hacking contest. During the first day, they successfully demonstrated exploits against Microsoft Edge, Apple's Safari, Adobe Reader, and Ubuntu Desktop.The Pwn2Own contest runs every year during the CanSecWest security conference in Vancouver, Canada. It's organized and sponsored by the Zero Day Initiative (ZDI), an exploit acquisition program operated by Trend Micro after its acquisition of TippingPoint.This year the contest has a prize pool of US$1 million for exploits in five categories: virtual machines (VMware Workstation and Microsoft Hyper-V); web browser and plugins (Microsoft Edge, Google Chrome, Mozilla Firefox, Apple Safari, and Flash Player running in Edge); local escalation of privilege (Windows, macOS, and Ubuntu Desktop); enterprise applications (Adobe Reader, Word, Excel, and PowerPoint) and server side (Apache Web Server on Ubuntu Server).To read this article in full or to leave a comment, please click here

DARPA plan would reinvent not-so-clever machine learning systems

Machine learning systems maybe be smart but they have a lot to discover.Innovative researchers with DARPA hope to achieve superior machine learning systems with a new program called Lifelong Learning Machines (L2M) which has as its primary goal to develop next-generation machine learning technologies that can learn from new situations and apply that learning to become better and more reliable than current constrained systems.+More on Network World: DARPA fortifies early warning system for power-grid cyber assault+To read this article in full or to leave a comment, please click here

DARPA plan would reinvent not-so-clever machine learning systems

Machine learning systems maybe be smart but they have a lot to discover.Innovative researchers with DARPA hope to achieve superior machine learning systems with a new program called Lifelong Learning Machines (L2M) which has as its primary goal to develop next-generation machine learning technologies that can learn from new situations and apply that learning to become better and more reliable than current constrained systems.+More on Network World: DARPA fortifies early warning system for power-grid cyber assault+To read this article in full or to leave a comment, please click here

DARPA plan would reinvent not-so-clever machine learning systems

Machine learning systems maybe be smart but they have a lot to discover.Innovative researchers with DARPA hope to achieve superior machine learning systems with a new program called Lifelong Learning Machines (L2M) which has as its primary goal to develop next-generation machine learning technologies that can learn from new situations and apply that learning to become better and more reliable than current constrained systems.+More on Network World: DARPA fortifies early warning system for power-grid cyber assault+To read this article in full or to leave a comment, please click here

75% off Etekcity 4 Pack Portable Outdoor LED Camping Lantern with 12 AA Batteries – Deal Alert

Whether used for camping, trick or treating, or power outages, this lantern will provide up to 12 hours of bright omnidirectional LED lighting to see your surroundings. When the battery power of the lantern runs low, the brightness will dim to an energy saving mode to provide longer lasting illumination (up to 4 hours of low power usage). It's lighter, brighter and more portable than most flashlights while still featuring the rugged durability to withstand the outdoors. The military grade exterior is water resistant for more practical use in a high range of environments. Ideal for children, the lantern needs no setup or prepping with fires and oil. The design provides full omnidirectional lighting for clear vision no matter where you may turn. The fold-out collapsible handles make for easier portability and hanging.  This lantern averages 4.8 out of 5 stars on Amazon (read reviews) and the 4 pack's list price of $79.99 has been reduced 75% to $19.99. Check it out on Amazon.To read this article in full or to leave a comment, please click here

Six Flags New England adds VR to another roller coaster

If riding a roller coaster with a virtual Superman isn’t your thing, Six Flags New England has an alternative pitch – get sent into space and fight alien invaders.The Agawam, Mass.-based amusement park today announced that its second coaster will get VR when it opens this spring. Partnering up with Samsung, the company said its Mind Eraser steel coaster will include the “Galactic Attack Virtual Reality Coaster” option, which will include a mixed reality feature that initially will let riders see the real world (including the rider next to them) in addition to the VR graphics. Like the Superman coaster, riders will put on a VR headset while enjoying the physical roller coaster’s drops and spins.To read this article in full or to leave a comment, please click here

Why is IR Automation and Orchestration So Hot?

I couldn’t attend the RSA Conference this year but many cybersecurity professionals and my ESG colleagues told me that incident response automation and orchestration was one of the hottest topics in the halls of the Moscone Center, through the bar at the W hotel, and even at the teahouse on the garden at Yerba Buena.   Was this rhetoric just industry hype?  Nope.  This buzz is driven by the demand side rather than suppliers.  In truth, cybersecurity professionals need immediate IR help for several reasons:1.      IR is dominated by manual processes.  Let’s face it, IR tasks like fetching data, tracking events, or collaborating with colleagues depend upon the organizational, communications, and technical skills of individuals within the security operations team.  These manual processes ultimately get in the way of overall IR productivity.  In a recent research project, infosec pros were asked: ‘Do you believe that your organization’s incident response efficiency and effectiveness are limited by the time and effort required for manual processes?’ Fifty-two percent of cybersecurity professionals responded, “yes, significantly” while another 41% said, “yes, somewhat.”  Furthermore, 27% of cybersecurity pros say they spend 50% or more of their Continue reading

Why is incident response automation and orchestration so hot?

I couldn’t attend the RSA Conference this year, but many cybersecurity professionals and my ESG colleagues told me that incident response (IR) automation and orchestration was one of the hottest topics in the halls of the Moscone Center—through the bar at the W hotel and even at the teahouse on the garden at Yerba Buena.   Was this rhetoric just industry hype? Nope. This buzz is driven by the demand side rather than suppliers. In truth, cybersecurity professionals need immediate IR help for several reasons:1. IR is dominated by manual processes. Let’s face it, IR tasks such as fetching data, tracking events or collaborating with colleagues depend upon the organizational, communications and technical skills of individuals within the security operations team. These manual processes ultimately get in the way of overall IR productivity.To read this article in full or to leave a comment, please click here

Why is incident response automation and orchestration so hot?

I couldn’t attend the RSA Conference this year, but many cybersecurity professionals and my ESG colleagues told me that incident response (IR) automation and orchestration was one of the hottest topics in the halls of the Moscone Center—through the bar at the W hotel and even at the teahouse on the garden at Yerba Buena.   Was this rhetoric just industry hype? Nope. This buzz is driven by the demand side rather than suppliers. In truth, cybersecurity professionals need immediate IR help for several reasons:1. IR is dominated by manual processes. Let’s face it, IR tasks such as fetching data, tracking events or collaborating with colleagues depend upon the organizational, communications and technical skills of individuals within the security operations team. These manual processes ultimately get in the way of overall IR productivity.To read this article in full or to leave a comment, please click here