Archive

Category Archives for "Networking"

SIEMs-as-a-service addresses needs of small, midsize enterprises

The city of Lewiston, in north central Idaho, has a population of around 32,000 and an information systems budget of around $800,000 a year.But it wasn't too small for attackers. For example, the city council meetings, streamed online, were being watched by people in Russia."Why are they watching this?" said Danny Santiago, the city's information systems administrator.Then there were the phishing attempts."We are negotiating a $2 million contract for road work, and we had spearphishing attacks," he said. "Luckily it's a small town, and everyone knows everyone, so people called us."To read this article in full or to leave a comment, please click here

HPE rolls out products to enable IoT adoption

Hewlett Packard Enterprise on Wednesday announced several software and hardware products to more securely manage the exploding universe of Internet of Things devices.October's Mirai botnet attack on unsecured IoT devices, which halted widespread access to dozens of popular internet sites, dramatizes the value of more comprehensive management and control of IoT, HPE executives said in interviews.Some of HPE's new products are intended for use by virtual cellular network providers, while others are for small and medium-sized enterprises to use in managing their local area network (LAN) operations.To read this article in full or to leave a comment, please click here

HPE rolls out products to enable IoT adoption

Hewlett Packard Enterprise on Wednesday announced several software and hardware products to more securely manage the exploding universe of Internet of Things devices.October's Mirai botnet attack on unsecured IoT devices, which halted widespread access to dozens of popular internet sites, dramatizes the value of more comprehensive management and control of IoT, HPE executives said in interviews.Some of HPE's new products are intended for use by virtual cellular network providers, while others are for small and medium-sized enterprises to use in managing their local area network (LAN) operations.To read this article in full or to leave a comment, please click here

48% off iPhone 7 Secure-Fit Workout Arm Band and Protective Case Bundle – Deal Alert

This lightweight and ultra-comfortable band from Encased is designed to securely fit your iPhone 7 4.7" by simply clipping on & off the included iPhone case (2016 Slimfit edition case, by Encased), so you won't need to place it in and out of another case or sleeve for your workout. The band comes in several different color options, and is fully adjustable to fit all arm sizes up to 14". The highly reflective pattern provides nighttime jogging & running protection, and its unique design maintains full touchscreen and button functionality during your workout with 0% screen obstruction. Its typical list price of $34.99 has been reduced 48% to just $18 for both the band and iPhone 7 case combo. See the discounted workout band on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: SecureAuth introduces another take on multi-factor authentication

SecureAuth is in the business of adaptive access control. What that means in plain (or at least more plain) English is that the company offers security solutions that balance strength with ease of use and that adapt to different use cases.An example of adaptive access control might be requiring a simple username and password for regular access, but requiring a higher level of authentication when the user (for example) logs in from another geography.+ Also on Network World: 5 trends shaking up multi-factor authentication + As data breaches have gained massive prominence in recent years, due in part to some celebrities' dual proclivities for poor password control and a penchant for naked selfies, the public has become increasingly aware of multi-factor authentication (MFA) a process that requires a subsequent authentication entry beyond simply username and password.To read this article in full or to leave a comment, please click here

IDG Contributor Network: SecureAuth introduces another take on multi-factor authentication

SecureAuth is in the business of adaptive access control. What that means in plain (or at least more plain) English is that the company offers security solutions that balance strength with ease of use and that adapt to different use cases.An example of adaptive access control might be requiring a simple username and password for regular access, but requiring a higher level of authentication when the user (for example) logs in from another geography.+ Also on Network World: 5 trends shaking up multi-factor authentication + As data breaches have gained massive prominence in recent years, due in part to some celebrities' dual proclivities for poor password control and a penchant for naked selfies, the public has become increasingly aware of multi-factor authentication (MFA) a process that requires a subsequent authentication entry beyond simply username and password.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 8 security tips for retailers and consumers this holiday season

It’s the time of year for holiday cheer. Hot chocolate, cookies, presents and other festivities abound. Shops dress up their windows in exotic displays, and festive lights can be seen everywhere. Yes, it’s the time of year when everything is grander and everyone seems happier.But it’s not always sunshine and roses during the holiday season. Trouble often lurks in the shadows—preying on both retailers and consumers. Criminals take advantage of the spike in spending, and use the opportunity to hide in the crowds and undertake fraud of various kinds.+ Also on Network World: Flash mobs the latest threat this holiday season + Financial fraud is the one that comes to mind first, but identity theft, impersonation and theft of items, among others, are all common. On top of that, every year cyber attackers improve on their techniques to steal information, money and goods.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 8 security tips for retailers and consumers this holiday season

It’s the time of year for holiday cheer. Hot chocolate, cookies, presents and other festivities abound. Shops dress up their windows in exotic displays, and festive lights can be seen everywhere. Yes, it’s the time of year when everything is grander and everyone seems happier.But it’s not always sunshine and roses during the holiday season. Trouble often lurks in the shadows—preying on both retailers and consumers. Criminals take advantage of the spike in spending, and use the opportunity to hide in the crowds and undertake fraud of various kinds.+ Also on Network World: Flash mobs the latest threat this holiday season + Financial fraud is the one that comes to mind first, but identity theft, impersonation and theft of items, among others, are all common. On top of that, every year cyber attackers improve on their techniques to steal information, money and goods.To read this article in full or to leave a comment, please click here

Study warns of human rights risks from censoring online terror content

Internet companies should not be required to monitor third-party terrorist content that they host or transmit, nor should they face direct or indirect liability from governments for such content, according to a new study. The Global Network Initiative, a group that represents academics, investors, civil society organizations and companies including Facebook, Google and Microsoft, published its study Tuesday. It's the offshoot of a policy discussion it started in July 2015, exploring key issues such as the human rights implications of government efforts to restrict online content with the aim of protecting public safety.To read this article in full or to leave a comment, please click here

Study warns of human rights risks from censoring online terror content

Internet companies should not be required to monitor third-party terrorist content that they host or transmit, nor should they face direct or indirect liability from governments for such content, according to a new study. The Global Network Initiative, a group that represents academics, investors, civil society organizations and companies including Facebook, Google and Microsoft, published its study Tuesday. It's the offshoot of a policy discussion it started in July 2015, exploring key issues such as the human rights implications of government efforts to restrict online content with the aim of protecting public safety.To read this article in full or to leave a comment, please click here

Cool tech at AWS re:Invent

Let the show beginImage by Thinkstock/AmazonAmazon Web Service’s re:Invent conference is one of the premier showcases for new cloud technology spanning across the infrastructure, platform and software as a service markets. Check out some of the hottest products being announced or displayed at the show, from new tools for managing big data to products that help optimize your cloud use to ones that help secure your environment.To read this article in full or to leave a comment, please click here

Finding Excuses to Avoid Network Automation

My Network Automation in Enterprise Environments blog post generated the expected responses, including:

Some of the environments I am looking at have around 2000-3000 devices and 6-7 vendors for various functions and 15-20 different device platform from those vendors. I am trying to understand what all environments can Ansible scale up to and what would be an ideal environment enterprises should be looking at more enterprise grade automation/orchestration platforms while keeping in mind that platform allows extensibility.

Luckily I didn’t have to write a response – one of the readers did an excellent job:

Read more ...

Wisconsin recount over suspected hacking will not be by hand

A judge in Wisconsin has refused to order a recount by hand of ballots cast in the state for the U.S. presidential elections, shooting down a petition by Green Party candidate Jill Stein that the use of automatic tabulating equipment, identified as potential targets of foreign government agents, “risks tainting the recount process.”The Wisconsin Elections Commission decided Friday to recount the votes in the state, after concerns were raised that the voting systems can be hacked. Democratic party candidate Hillary Clinton also backed the recount, including the hand count.To read this article in full or to leave a comment, please click here

Wisconsin recount over suspected hacking may not be entirely by hand

A judge in Wisconsin has refused to order a recount by hand of ballots cast in the state for the U.S. presidential elections, shooting down a petition by Green Party candidate Jill Stein that the use of automatic tabulating equipment, identified as potential targets of foreign government agents, “risks tainting the recount process.” The Wisconsin Elections Commission decided Friday to recount the votes in the state, after concerns were raised that the voting systems can be hacked. Democratic party candidate Hillary Clinton also backed the recount, including the hand count.To read this article in full or to leave a comment, please click here

Wisconsin recount over suspected hacking may not be entirely by hand

A judge in Wisconsin has refused to order a recount by hand of ballots cast in the state for the U.S. presidential elections, shooting down a petition by Green Party candidate Jill Stein that the use of automatic tabulating equipment, identified as potential targets of foreign government agents, “risks tainting the recount process.” The Wisconsin Elections Commission decided Friday to recount the votes in the state, after concerns were raised that the voting systems can be hacked. Democratic party candidate Hillary Clinton also backed the recount, including the hand count.To read this article in full or to leave a comment, please click here

Amazon cloud chief says partners should focus all on AWS

Amazon Web Services executives like to talk about customers who are going “all-in” on the company’s cloud platform, ditching their data centers and investing fully in IaaS.According to media reports, AWS CEO Andy Jassy is encouraging the company’s partners to do the same thing. Jassy reportedly encouraged partners at the re:Invent conference to focus their expertise on the AWS cloud.+MORE AT NETWORK WORLD: How to compare costs between Amazon, Azure and Google clouds +To read this article in full or to leave a comment, please click here

Microsoft patches RHEL instances in Azure cloud

Microsoft has patched a vulnerability stemming from its configuration of Red Hat Enterprise Linux (RHEL) in the Azure public cloud that a customer discovered.+MORE AT NETWORK WORLD: How to compare costs between AWS, Azure and Google clouds +Microsoft Azure uses a process in which all instances of the RHEL operating system check back to a centralized system to ensure it is up to date. The customer, Ian Duffy in Ireland, found that he was able to access that master copy of RHEL, which could have allowed him or anyone else to implant a security vulnerability into the master copy of the program that would have propagated throughout any Azure customer using the OS.To read this article in full or to leave a comment, please click here