Archive

Category Archives for "Networking"

What’s the value in attack attribution?

For those who pursue forensic analysis with the hope of identifying and prosecuting an attacker, they likely will find that the time spent on attack attribution is fruitless.If, however, they are looking to use what they gain through attack attribution to inform their overall security procedures from prevention to response, the effort yields valuable results.Many experts in the industry have questioned whether there is any value to attribution. SafeBreach CTO & co-founder Itzik Kotler said, "The only interesting aspect in attribution itself is to classify and put information in a box and use it over and over again."Kolter offered a hypothetical in which right now CNN gets hacked by the Chinese. "That someone can or cannot attribute it to the Chinese doesn't matter. It does matter if we can say we think this is from China," Kolter said.To read this article in full or to leave a comment, please click here

What’s the value in attack attribution?

For those who pursue forensic analysis with the hope of identifying and prosecuting an attacker, they likely will find that the time spent on attack attribution is fruitless.If, however, they are looking to use what they gain through attack attribution to inform their overall security procedures from prevention to response, the effort yields valuable results.Many experts in the industry have questioned whether there is any value to attribution. SafeBreach CTO & co-founder Itzik Kotler said, "The only interesting aspect in attribution itself is to classify and put information in a box and use it over and over again."Kolter offered a hypothetical in which right now CNN gets hacked by the Chinese. "That someone can or cannot attribute it to the Chinese doesn't matter. It does matter if we can say we think this is from China," Kolter said.To read this article in full or to leave a comment, please click here

Smackdown: Office 365 vs. G Suite collaboration

Ever since I can remember, Silicon Valley has been enamored with the idea of group editing of documents. Very little good writing gets done that way, of course. It’s like the joke that a camel is a horse designed by committee. Office 365 vs. G Suite: Meeting collaborationTo read this article in full or to leave a comment, please click here(Insider Story)

Ryzen CPUs explained: Everything you need to know about AMD’s disruptive multicore chips

After a decade of fielding ho-hum FX-series processors, AMD’s finally released its highly disruptive Ryzen chips, throwing down the gauntlet and challenging Intel’s supremacy in high-end computing.AMD’s new Ryzen chips include several CPUs (and CPU families) of various levels of potency. What’s more, Ryzen introduces a completely new motherboard platform, and the processors require different memory and coolers than their predecessors. There’s a lot to sift through—so let’s sift!Here’s everything you need to know about AMD’s Ryzen.Meet AMD’s Ryzen CPUs AMD Details about the AMD Ryzen chips announced thus far.To read this article in full or to leave a comment, please click here

Here’s how Microsoft has rethought its approach to email

Two years ago, Microsoft made a massive shift in the way it approached the email market. In January 2015, the company launched Outlook for iOS and Android, free professional-grade email apps for two platforms that Microsoft previously underserved in that regard.Outlook for iOS and its Android sibling were special, because they supported Gmail, Yahoo and iCloud email, in addition to Microsoft’s Outlook.com, Office 365 and Exchange email offerings. While connecting to third party email providers isn't new for Outlook, offering one-click support for different email providers at launch sent a message that this wouldn't be locked to the Microsoft ecosystem.To read this article in full or to leave a comment, please click here

Consumer Reports decision to rate cybersecurity is a huge deal

Conventional wisdom has it that most consumers simply don’t pay much attention to computer security and privacy issues. Perhaps worse, they don’t think they can do much to protect themselves without foregoing many of the benefits of our digital, connected age. Consumer Reports is trying to change both of those things. Consumer Reports’ new cybersecurity standard The influential publication and public-interest organization announced on Monday that it has collaborated on a digital consumer-protection standard designed to define “how companies should build these products to really be good for consumers in terms of privacy and other issues,” said Maria Rerecich, who directs electronics testing at Consumer Reports, in a statement. To read this article in full or to leave a comment, please click here

Consumer Reports decision to rate cybersecurity is a huge deal

Conventional wisdom has it that most consumers simply don’t pay much attention to computer security and privacy issues. Perhaps worse, they don’t think they can do much to protect themselves without foregoing many of the benefits of our digital, connected age. Consumer Reports is trying to change both of those things. Consumer Reports’ new cybersecurity standard The influential publication and public-interest organization announced on Monday that it has collaborated on a digital consumer-protection standard designed to define “how companies should build these products to really be good for consumers in terms of privacy and other issues,” said Maria Rerecich, who directs electronics testing at Consumer Reports, in a statement. To read this article in full or to leave a comment, please click here

6 cloud computing savings you may be missing out on

Hidden costs?Image by ThinkstockAs more organizations deploy applications in the cloud to meet demand spikes, cost is a major consideration. Often, businesses start comparing service charges and the cost of renting or buying nodes, making a list of all of the things that matter to each option: computing in the cloud, renting compute capacity for some amount of time, or adding servers to the permanent arsenal. While these contributing factors may seem obvious and the math relatively straightforward, those who have taken the leap into the cloud have often cited that crucial cost considerations are easily overlooked.To read this article in full or to leave a comment, please click here

US senator probes into CloudPets smart toy hack

A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices.Bill Nelson, a Florida Democrat, wrote in a letter Tuesday to CEO Mark Meyers that the breach raises serious questions concerning how well the company protects the information it collects, particularly from children.Nelson also said that the incident raises questions about the vendor's compliance with the Children’s Online Privacy Protection Act that requires covered companies to have reasonable procedures to protect the confidentiality, security and integrity of personal information collected from children.To read this article in full or to leave a comment, please click here

US senator probes into CloudPets smart toy hack

A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices.Bill Nelson, a Florida Democrat, wrote in a letter Tuesday to CEO Mark Meyers that the breach raises serious questions concerning how well the company protects the information it collects, particularly from children.Nelson also said that the incident raises questions about the vendor's compliance with the Children’s Online Privacy Protection Act that requires covered companies to have reasonable procedures to protect the confidentiality, security and integrity of personal information collected from children.To read this article in full or to leave a comment, please click here

US Senate resolution aims to roll back privacy rules for ISPs

A resolution introduced in the U.S. Senate on Tuesday aims to roll back privacy rules for broadband service providers that were approved by the Federal Communications Commission in October.The rules include the requirement that internet service providers like Comcast, AT&T, and Verizon should obtain "opt-in" consent from consumers to use and share sensitive personal information such as geolocation and web browsing history, and also give customers the option to opt out from the sharing of non-sensitive information such as email addresses or service tier information.The rules have been opposed by internet service providers who argue that they are being treated differently from other Internet entities like search engines and social networking companies.To read this article in full or to leave a comment, please click here

US Senate resolution aims to roll back privacy rules for ISPs

A resolution introduced in the U.S. Senate on Tuesday aims to roll back privacy rules for broadband service providers that were approved by the Federal Communications Commission in October.The rules include the requirement that internet service providers like Comcast, AT&T, and Verizon should obtain "opt-in" consent from consumers to use and share sensitive personal information such as geolocation and web browsing history, and also give customers the option to opt out from the sharing of non-sensitive information such as email addresses or service tier information.The rules have been opposed by internet service providers who argue that they are being treated differently from other Internet entities like search engines and social networking companies.To read this article in full or to leave a comment, please click here

It pays to be a technology architect

You seriously might want to consider negotiating to get the word "architect" in your title if you're a technology professional. About a quarter of the titles on the latest Glassdoor report on the highest paying jobs in America are tech architect roles. Medical and legal professionals rank at the very top of the list, with physicians pulling down nearly $188K for a median base salary, based on information supplied by employees in the online job and recruiting marketplace's database. But tech jobs are well represented too, with Enterprise Architect, at #6, commanding a median base salary of $112,560 and more than 1,300 such jobs up for grabs in Glassdoor's listings (at least 100 salary reports needed to be shared for jobs to make this list).To read this article in full or to leave a comment, please click here

Microsoft’s Visual Studio 2017 hits general availability

Microsoft’s tools for developers hit another milestone Tuesday, when the company made Visual Studio 2017 generally available. As the name implies, this is the next major release of Microsoft’s integrated development environment. It’s aimed at providing tools for developers to create modern apps for the cloud, mobile platforms and more. The software gained a Xamarin Forms previewer that lets users view a mobile user interface for iOS and Android apps as they’re writing XAML, an XML-based markup language developed by Microsoft.To read this article in full or to leave a comment, please click here

Extreme Networks buying Avaya networking good for customers of both companies

The fate of Avaya’s networking business has been the subject of speculation for well over a year now. In December, I wrote about the most likely suitors for the business. Ideally, I would have liked to have seen Avaya remain a “full stack” solution provider and keep the group, but it appears that wasn’t in the bankruptcy cards. This brings us to the current news where the winner of the Avaya Networking sweepstakes is (drum roll… although its in the title) Extreme Networks. That’s correct: Purple Extreme Networks is purchasing the networking assets from Avaya (Red) that came to it from Nortel (blue), so from a color perspective, it all makes sense. To read this article in full or to leave a comment, please click here