Archive

Category Archives for "Networking"

Which Job-Related Factors Alienate Cybersecurity Pros?

When it comes to cybersecurity jobs, it is truly a seller’s market.  According to ESG research published early this year, 46% of organizations report a problematic shortage of cybersecurity skills (note: I am an ESG employee).  Additionally, a more recent research report from ESG and the Information Systems Security Association (ISSA) indicates that 46% of cybersecurity professionals are solicited by recruiters to consider another job at least once each week!The data indicates that there aren’t enough cybersecurity professionals around and those that are employed are in high demand.  This puts a lot of pressure on CISOs and human resources people to make sure to keep their existing cybersecurity staff happy so they don’t walk out the door when they are barraged by headhunters’ calls. To read this article in full or to leave a comment, please click here

Which job-related factors alienate cybersecurity pros?

When it comes to cybersecurity jobs, it is truly a seller’s market.  According to ESG research published early this year, 46% of organizations report a problematic shortage of cybersecurity skills (note: I am an ESG employee).  Additionally, a more recent research report from ESG and the Information Systems Security Association (ISSA) indicates that 46% of cybersecurity professionals are solicited by recruiters to consider another job at least once each week! The data indicates that there aren’t enough cybersecurity professionals around and those that are employed are in high demand.  This puts a lot of pressure on CISOs and human resources people to make sure to keep their existing cybersecurity staff happy so they don’t walk out the door when they are barraged by headhunters’ calls. To read this article in full or to leave a comment, please click here

Renowned tech investor Harry Weller of NEA passes away at 46

There was sad news over the weekend in the venture capital community, as New Enterprise Associate General Partner Harry Weller died in his sleep at the age of 46. Weller, who was not known to have had any illness, is survived by his wife and two sons."A renowned technology investor, champion of innovation and true partner to entrepreneurs, many knew Harry to be bold, brilliant and passionate," NEA says on a tribute to Weller on its website." To those who knew him best, he was equally remarkable for his kind heart and generous spirit. Harry was a deeply devoted father, husband and friend."MORE: Notable deaths in 2016 in technology, science & inventionsTo read this article in full or to leave a comment, please click here

Renowned tech investor Harry Weller of NEA passes away at 46

There was sad news over the weekend in the venture capital community, as New Enterprise Associate General Partner Harry Weller died in his sleep at the age of 46. Weller, who was not known to have had any illness, is survived by his wife and two sons."A renowned technology investor, champion of innovation and true partner to entrepreneurs, many knew Harry to be bold, brilliant and passionate," NEA says on a tribute to Weller on its website." To those who knew him best, he was equally remarkable for his kind heart and generous spirit. Harry was a deeply devoted father, husband and friend."MORE: Notable deaths in 2016 in technology, science & inventionsTo read this article in full or to leave a comment, please click here

98.01% of sites on Cloudflare now use IPv6

It's 2016 and almost every site using Cloudflare (more than 4 million of them) is using IPv6. Because of this, Cloudflare sees significant IPv6 traffic globally where networks have enabled IPv6 to the consumer.

The top IPv6 networks are shown here.

The chart shows the percentage of IPv6 within a specific network vs. the relative bandwidth of that network. We will talk about specific networks below.

Why IPv6? Because fast internet.

IPv6 is faster for two reasons. The first is that many major operating systems and browsers like iOS, MacOS, Chrome and Firefox impose anywhere from a 25ms to 300ms artificial delay on connections made over IPv4. The second is that some mobile networks won’t need to perform extra v4 -> v6 and v6 -> v4 translations to connect visitors to IPv6 enabled sites if the phone is only assigned an IPv6 address. (IPv6-only phones are becoming very common. If you have a phone on T-Mobile, Telstra, SK Telecom, Orange, or EE UK, to name a few, it’s likely you’re v6-only.)

How much faster is IPv6? Our data shows that visitors connecting over IPv6 were able to connect and load pages in 27% less time than visitors connecting Continue reading

Facebook working with fact-checkers to weed out fake news

Returning to the controversy over fake news on the social networking site, Facebook CEO Mark Zuckerberg said over the weekend that the company was working with fact-checking organizations to put in place third-party verification of the authenticity of news on its site. Facebook has been criticized for fake news on its site, which is claimed to have tilted the recent U.S. presidential elections in favor of Republican candidate Donald Trump. Zuckerberg warned in his post late Friday that the website needs to be careful not to discourage sharing of opinions or to mistakenly restrict accurate content. “We do not want to be arbiters of truth ourselves, but instead rely on our community and trusted third parties,” he wrote.To read this article in full or to leave a comment, please click here

10 top holiday phishing scams

Scams to keep an eye out forImage by ThinkstockIt always happens this time of year, an influx of holiday related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to take your money and personal information. Jon French, security analyst at AppRiver, warns you of six holiday threats to watch out for.To read this article in full or to leave a comment, please click here

10 top holiday phishing scams

Scams to keep an eye out forImage by ThinkstockIt always happens this time of year, an influx of holiday related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to take your money and personal information. Jon French, security analyst at AppRiver, warns you of six holiday threats to watch out for.To read this article in full or to leave a comment, please click here

20 ways to hate Windows 10 less

Windows 10 -- your wayNo matter who you are and where you stand on the raging Windows 10 issues, I bet there are some things you love about your new operating system, along with other things you wish were better, had stayed the same, or simply went away.In this slideshow, I take you through the parts of Win10 that irk me the most, giving you quick tips on how to set things right ... or at least, right-er. Your opinion will vary, of course, and if you have other beefs (and solutions!) post them in the comments below or over on AskWoody.com.To read this article in full or to leave a comment, please click here

Security basics for the holiday season, and the year to come

Let's go shopping!Image by Diariocritico de VenezuelaAs far as theft and fraud are concerned, consumers face (and willingly accept) a moderate amount of risk when they shop online or out in their local neighborhoods. This holiday season is no different, but the risk is elevated some, because criminals are looking for easy marks and low-hanging fruit.To read this article in full or to leave a comment, please click here

Security basics for the holiday season, and the year to come

Let's go shopping!Image by Diariocritico de VenezuelaAs far as theft and fraud are concerned, consumers face (and willingly accept) a moderate amount of risk when they shop online or out in their local neighborhoods. This holiday season is no different, but the risk is elevated some, because criminals are looking for easy marks and low-hanging fruit.To read this article in full or to leave a comment, please click here

Most hackable holiday gifts

Whether you are looking for a steal of deal on the latest and greatest gadgets or shopping to fulfill a loved one’s wish list, have you considered if the gadget is one of the most hackable?If not, then Intel Security has considered it for you and released its second annual McAfee Most Hackable Holiday Gifts list.The company first surveyed people to find out what average consumers plans to purchase and what they know about securing their new devices; the findings included that the average consumer lacks “awareness about the potential risks associated with emerging connected devices, such as drones (20%), children’s toys (15%), virtual reality tech (15%), and pet gifts (11%).”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Supplier management: The biggest threat to SD-WANs—and what you can do about it

You know the adage about a cup being half full or half empty? Maybe the author had software-defined WANs (SD-WANs) in mind. Their ability to select between internet services is critical to delivering stable, predictable performance. But with multiple providers at each site, carrier management becomes a nightmare for SD-WANs. The answer might be Global Managed Internet Providers, also called Virtual Network Operators (VNOs).Multiple Paths: The key to SD-WAN availability One of the biggest limitations of any SD-WAN is the dependence on the internet. Over the years, internet performance has improved dramatically. A look at the internet loss metrics from Stanford’s PINGer project show median loss rates across the globe have steadily declined since 1999, improving by 88 percent. Yet for all of its improvement, the internet remains an unmanaged network. Latency and loss rates may outperform private data services on some days, but enterprises look for data services to perform well every day.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Supplier management: The biggest threat to SD-WANs—and what you can do about it

You know the adage about a cup being half full or half empty? Maybe the author had software-defined WANs (SD-WANs) in mind. Their ability to select between internet services is critical to delivering stable, predictable performance. But with multiple providers at each site, carrier management becomes a nightmare for SD-WANs. The answer might be Global Managed Internet Providers, also called Virtual Network Operators (VNOs).Multiple Paths: The key to SD-WAN availability One of the biggest limitations of any SD-WAN is the dependence on the internet. Over the years, internet performance has improved dramatically. A look at the internet loss metrics from Stanford’s PINGer project show median loss rates across the globe have steadily declined since 1999, improving by 88 percent. Yet for all of its improvement, the internet remains an unmanaged network. Latency and loss rates may outperform private data services on some days, but enterprises look for data services to perform well every day.To read this article in full or to leave a comment, please click here

Most hackable holiday gifts

Whether you are looking for a steal of deal on the latest and greatest gadgets or shopping to fulfill a loved one’s wish list, have you considered if the gadget is one of the most hackable?If not, then Intel Security has considered it for you and released its second annual McAfee Most Hackable Holiday Gifts list.The company first surveyed people to find out what average consumers plans to purchase and what they know about securing their new devices. The findings included that the average consumer lacks “awareness about the potential risks associated with emerging connected devices, such as drones (20%), children’s toys (15%), virtual reality tech (15%) and pet gifts (11%).”To read this article in full or to leave a comment, please click here