Archive

Category Archives for "Networking"

Toxic Cultures and Reality

I have lived through multiple toxic cultures in my life. It’s easy to say, “just quit,” or “just go to HR,” but—for various reasons—these are not always a good solution. For instance, if you are in the military, “just quit” is not, precisely, an option. So how should you deal with these sorts of bad situations?

Start here: you are not going to change the culture. Just like I tell my daughters not to date guys so they can “fix” them, I have never seen anyone “fix” a culture through any sort of “mass action.” You are not going to “win” by going to the boss, or by getting someone from the outside to force everyone to change. You are not going to change the culture by griping about it. Believe me, I’ve tried all these things. They don’t (really) work.

Given these points, what can you do?

Start with a large dose of humility. First, you are probably a part of a number of toxic cultures yourself, and you probably even contribute at least some amount of the poison. Second, you are almost always limited in your power to change things; your influence, no matter how right you Continue reading

IDG Contributor Network: How to practice cybersecurity (and why it’s different from IT security)

Keeping companies safe from attackers is no longer just a technical issue of having the right defensive technologies in place. To me, this is practicing IT security, which is still needed but doesn’t address what happens after the attackers infiltrate your organization (and they will, despite your best efforts to keep them out).I’m trying to draw attention to this topic to get security teams, businesses executives and corporate boards to realize that IT security will not help them once attackers infiltrate a target. Once this happens, cybersecurity is required.  + Also on Network World: Recruiting and retaining cybersecurity talent + In cybersecurity, the defenders acknowledge that highly motivated and creative adversaries are launching sophisticated attacks. There’s also the realization that when software is used as a weapon, building a stronger or taller wall may not necessarily keep out the bad guys. To them, more defensive measures provide them with additional opportunities to find weak spots and gain access to a network.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to practice cybersecurity (and why it’s different from IT security)

Keeping companies safe from attackers is no longer just a technical issue of having the right defensive technologies in place. To me, this is practicing IT security, which is still needed but doesn’t address what happens after the attackers infiltrate your organization (and they will, despite your best efforts to keep them out).I’m trying to draw attention to this topic to get security teams, businesses executives and corporate boards to realize that IT security will not help them once attackers infiltrate a target. Once this happens, cybersecurity is required.  + Also on Network World: Recruiting and retaining cybersecurity talent + In cybersecurity, the defenders acknowledge that highly motivated and creative adversaries are launching sophisticated attacks. There’s also the realization that when software is used as a weapon, building a stronger or taller wall may not necessarily keep out the bad guys. To them, more defensive measures provide them with additional opportunities to find weak spots and gain access to a network.To read this article in full or to leave a comment, please click here

How to stay relevant as a CIO

“All technology positions are migrating towards having to be hands-on,” Christopher Barron, CIO at Zander Rose LLC, told the audience at the December 2016 CIO Perspectives event in Houston. “That classic perception of a strategic CIO as being someone who always sits away, who tells other people what to do [is going away] …. All the leadership positions in IT, even if you are strategic, you’re going to have to be hands-on. Your customers will demand that.To read this article in full or to leave a comment, please click here(Insider Story)

10 principles of a successful IoT strategy

The internet of things (IoT) presents an opportunity for enterprises to rewrite the rules of their industry. The potential upside is massive: According to research firm Gartner, there will be nearly 20 billion devices on the IoT by 2020, and IoT product and service suppliers will generate $300 billion+ in revenue.By bringing together sensors, connectivity, cloud storage, processing, analytics and machine learning, IoT may well transform countless industries, from healthcare to manufacturing to utilities, transit, government and more. But IoT is still in its early days. Creating and executing an IoT strategy for your organization is no mean feat, says John Rossman, author of The Amazon Way on IoT: 10 Principles for Every Leader from the World's Leading Internet of Things Strategies.To read this article in full or to leave a comment, please click here

Tim Cook: ‘Apple would not exist without immigration’

Apple has championed the causes of marriage equality and environmental sustainability in recent years, so its employees looked to the company’s leadership in the wake of President Donald Trump’s executive order on immigration from predominantly Muslim countries. The order, which restricts immigration from seven countries and outright bans refugees from Syria, was handed down late Friday and led to protests in several U.S. cities and at airports where refugees were being detained.“Apple would not exist without immigration, let alone thrive and innovate the way we do,” Apple CEO Tim Cook wrote in an email to the company’s employees, later published by Re/code. “I’ve heard from many of you who are deeply concerned about the executive order issued yesterday restricting immigration from seven Muslim-majority countries. I share your concerns. It is not a policy we support.”To read this article in full or to leave a comment, please click here

Dropbox highlights productivity enhancements in rollout of new services

Dropbox kicked off its 2017 product launches with a pair of major announcements Monday aimed at improving users’ productivity at work. The cloud storage company announced the general availability of its Paper document collaboration service, along with the closed beta of a Smart Sync feature that gives users easy access to every file shared with them in Dropbox. Paper , first announced in 2015 , gives users a shared workspace to work with one another on documents. It’s designed to be the product people use for collaborative tasks like brainstorming and taking meeting notes.To read this article in full or to leave a comment, please click here

Google strengthens Android relationship with Intel in IoT

Intel may have cut ties with Android on smartphones and tablets, but the company's partnership with Google on Android for the internet of things is growing stronger.Google's Android Things, a slimmed down version of Android for smart devices, will be coming to Intel's Joule 570x computer board.The combination will allow makers to cook up Android-based gadgets or smart devices for use in home, retail, or industrial settings.The Intel board adds a lot of processing and graphics muscle to projects. With 4K graphics capabilities, the 570x is good for devices with screens or computer vision, like robots and drones. Intel demonstrated a bartending robot that used the board at its annual trade show last year.To read this article in full or to leave a comment, please click here

Spear phishing tough to block, even when using automation tools

Trying to filter out phishing emails is tough work, even for organizations trying to find a better way through automation, according to a new study from security software company GreatHorn.The company makes software that seeks out phishing attempts and can autonomously block them, but even its customers don’t switch on all the features, according to GreatHorn’s study of how customers dealt with just over half a million spear phishing attempts.The most common autonomous action, taken a third of the time against suspicious emails, was to alert an admin when a policy was violated and let them decide what to do. This option is also chosen in order to create a record of potential threats, the company says. Another 6% of emails trigger alerts to the recipients so they can be on the lookout for similar attempts.To read this article in full or to leave a comment, please click here

Spear phishing tough to block, even when using automation tools

Trying to filter out phishing emails is tough work, even for organizations trying to find a better way through automation, according to a new study from security software company GreatHorn.The company makes software that seeks out phishing attempts and can autonomously block them, but even its customers don’t switch on all the features, according to GreatHorn’s study of how customers dealt with just over half a million spear phishing attempts.The most common autonomous action, taken a third of the time against suspicious emails, was to alert an admin when a policy was violated and let them decide what to do. This option is also chosen in order to create a record of potential threats, the company says. Another 6% of emails trigger alerts to the recipients so they can be on the lookout for similar attempts.To read this article in full or to leave a comment, please click here

Cisco fosters Blockchain protocol development, IBM shows why technology could relieve security anxiety

Cisco has helped form a consortium to develop blockchain that could secure Internet of Things applications and more while new study by IBM shows why the technology could become invaluable for businesses worldwide.Reports from Reuters and a press release from the group said that Cisco has teamed up with Bank of New York Mellon, Foxconn, Gemalto and blockchain startups Consensus Systems (ConsenSys), BitSE and Chronicled to form a blockchain consortium that said it will develop a shared blockchain protocol for aimed at IoT products.To read this article in full or to leave a comment, please click here

Cisco fosters Blockchain protocol development, IBM shows why technology could relieve security anxiety

Cisco has helped form a consortium to develop blockchain that could secure Internet of Things applications and more while new study by IBM shows why the technology could become invaluable for businesses worldwide.Reports from Reuters and a press release from the group said that Cisco has teamed up with Bank of New York Mellon, Foxconn, Gemalto and blockchain startups Consensus Systems (ConsenSys), BitSE and Chronicled to form a blockchain consortium that said it will develop a shared blockchain protocol for aimed at IoT products.To read this article in full or to leave a comment, please click here

Ransomware disrupts Washington DC’s CCTV system

About 70 percent of the cameras hooked up to the police's closed-circuit TV (CCTV) system in Washington, D.C., were reportedly unable to record footage for several days before President Trump's inauguration due to a ransomware attack.The attack affected 123 of the 187 network video recorders that form the city's CCTV system, the Washington Post reported Saturday. Each of these devices is used to store video footage captured by up to four cameras installed in public spaces.To read this article in full or to leave a comment, please click here

Ransomware disrupts Washington DC’s CCTV system

About 70 percent of the cameras hooked up to the police's closed-circuit TV (CCTV) system in Washington, D.C., were reportedly unable to record footage for several days before President Trump's inauguration due to a ransomware attack.The attack affected 123 of the 187 network video recorders that form the city's CCTV system, the Washington Post reported Saturday. Each of these devices is used to store video footage captured by up to four cameras installed in public spaces.To read this article in full or to leave a comment, please click here