Archive

Category Archives for "Networking"

10 ways to make sure your remote workers are being safe

SafeguardsImage by PexelsWith an ever-expanding mobile workforce, infosec teams are increasingly tasked with extending cybersecurity safeguards beyond the physical and virtual walls of their organizations. With endpoints not only increasing but on the move, the challenge is real. In addition to implementing the appropriate technical defenses, there is an important aspect to protecting corporate data and systems: Asking end users to get involved.To read this article in full or to leave a comment, please click here

IT Resume Makeover: Highlighting business and technology leadership

Not everyone has a typical career trajectory where titles, skills and promotions all line up into a neat, concise story. That was the case with Keith Evans. He held varying CIO roles with the same company and had skills that set him apart from other CIOs, which caused some confusion and resulted in a dense resume. Laura Smith-Proulx, career and resume expert, knew that the goal with re-writing Evan's resume was to organize the existing information to build a clear picture of his extensive skills and experience as a CIO.To read this article in full or to leave a comment, please click here(Insider Story)

5 ways to reduce bias in your hiring practices

Unconscious and implicit biases are a major barrier to diversity and inclusion efforts in the workplace, and they can have far-reaching implications on the success of individual employees and the company as a whole. The key, says Katherin Nukk-Freeman and Suzanne Cerra, employment law attorneys and co-founders of SHIFT HR Compliance Training, is not to say, "are we unconsciously biased?" but rather, "What can we do about our implicit biases?"Nukk-Freeman and Cerra offer five bias-busting strategies HR teams can implement in their organizations to create a more diverse and inclusive culture.To read this article in full or to leave a comment, please click here

Unencrypted pagers a security risk for hospitals, power plants

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages are sent without encryption, attackers can listen in and even interfere with the communications.According to two new reports by Trend Micro, pagers are still in use in hospital settings and in industrial plants.Stephen Hilt, Trend Micro's lead researcher on the project, said they don’t have a concrete percentage on the number of encrypted messages.To read this article in full or to leave a comment, please click here

Unencrypted pagers a security risk for hospitals, power plants

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages are sent without encryption, attackers can listen in and even interfere with the communications.According to two new reports by Trend Micro, pagers are still in use in hospital settings and in industrial plants.Stephen Hilt, Trend Micro's lead researcher on the project, said they don’t have a concrete percentage on the number of encrypted messages.To read this article in full or to leave a comment, please click here

How sports execs use tech to improve fan engagement

HALF MOON BAY, CALIF. - If there’s one thing that hasn’t changed much in sports it’s that winning cures a lot of ills. Fans generally don’t want to follow or pay to see a team that’s always losing, but competitive teams with a shot at a championship typically attract more fans and can generate more revenue via merchandise, media and other ancillary deals.But one thing that has changed, sports are not the only game in town. From live performances to outdoor activities and the many choices in big and small screen entertainment, consumers have more options as to how to spend their free time and money than ever before.As a result, professional sports teams are investing in new ways to attract and engage fans both inside and outside the ballpark or stadium and technology is a big part of those investments.To read this article in full or to leave a comment, please click here

Here’s how businesses can prevent point-of-sale attacks

Retailers, hotels and restaurants have all been victimized through the same Achilles' heel that cybercriminals continue to attack: the point-of-sale system, where customers' payment data is routinely processed.  These digital cash registers are often the target of malware designed to steal credit card numbers in the thousands or even millions. This year, fast food vendor Wendy's, clothing retailer Eddie Bauer and Kimpton Hotels have all reported data breaches stemming from such attacks.Security experts, however, are encouraging a variety of approaches to keep businesses secure from point-of-sale-related intrusions. Here are a few to consider:To read this article in full or to leave a comment, please click here

Here’s how businesses can prevent point-of-sale attacks

Retailers, hotels and restaurants have all been victimized through the same Achilles' heel that cybercriminals continue to attack: the point-of-sale system, where customers' payment data is routinely processed.  These digital cash registers are often the target of malware designed to steal credit card numbers in the thousands or even millions. This year, fast food vendor Wendy's, clothing retailer Eddie Bauer and Kimpton Hotels have all reported data breaches stemming from such attacks.Security experts, however, are encouraging a variety of approaches to keep businesses secure from point-of-sale-related intrusions. Here are a few to consider:To read this article in full or to leave a comment, please click here

Hewlett Packard Enterprise and Mirantis cut OpenStack staff

Hewlett Packard Enterprise and Mirantis - two of the most instrumental companies in the open source cloud computing project OpenStack - have each laid off employees in recent weeks, according to the companies.The full extent of the layoffs at HPE is unknown but ComputerWorldUK last week quoted Canonical founder Mark Shuttleworth as saying that HPE had laid off their “entire OpenStack team.” An official with HPE confirmed there has been a restructuring but would not say how many OpenStack workers were cut, adding that Shuttleworth’s statement is exaggerated.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is your personal relevance gap growing faster than your waistline?

In a previous series of blogs, I talked about why your network is the critical foundation of the digital transformation and of the business benefits of moving to a new IP network architecture. I talked about how networks help you control time, how the effects of Metcalfe’s and Reed’s Laws result in wealth creation, and why there is such a tension between your dumb pipes and your smart business. But it’s not just the technology that matters in this coming digital transformation; it’s also your skills and ultimately your career.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Is your personal relevance gap growing faster than your waistline?

In a previous series of blogs, I talked about why your network is the critical foundation of the digital transformation and of the business benefits of moving to a new IP network architecture. I talked about how networks help you control time, how the effects of Metcalfe’s and Reed’s Laws result in wealth creation, and why there is such a tension between your dumb pipes and your smart business. But it’s not just the technology that matters in this coming digital transformation; it’s also your skills and ultimately your career.To read this article in full or to leave a comment, please click here

First Speakers in the Spring 2017 Data Center Course

It’s only two weeks since the last live session of the Autumn 2016 Data Center course in which Mitja Robas did a fantastic job describing a production deployment of VMware NSX on top of Cisco Nexus 9000 network, and we already have the first speakers for the Spring 2017 event:

  • Scott Lowe (now at VMware) will talk about the role of open source in data center infrastructure;
  • Thomas Wacker (UBS AG) will talk about their fully automated data center deployments;
  • Andrew Lerner and Simon Richard (Gartner) will participate in a panel discussion on data center and networking trends.

IDG Contributor Network: Apcera rolls out its container management platform

Apcera is an interesting company. Its founder, Derek Collison, was one of the key people behind Cloud Foundry back when it was a small platform project within VMware. Since then Cloud Foundry has gone on to become, arguably, the most important platform as a service (PaaS) organization on earth.+ Also on Network World: PaaS vendors draw battle lines over containers + Collison has moved on as well and founded Apcera, a company focused on giving large enterprises the certainty that comes from using a platform with security and policy baked in. In a world were organizations are hearing more and more about containers and cloud-native applications, having a platform that allows them to use these technologies within the context of tight policy is an attractive proposition.To read this article in full or to leave a comment, please click here

Google clashes with Microsoft over Windows flaw disclosure

Google and Microsoft are butting heads over the disclosure of vulnerabilities. On Monday, Google revealed a critical flaw in Windows after it gave Microsoft a ten-day window to warn the public about it.Google posted about the zero-day vulnerability on its security blog, saying Microsoft had yet to publish a fix or issue an advisory about the software flaw."This vulnerability is particularly serious because we know it is being actively exploited," Google said. It lets hackers exploit a bug in the Windows kernel, via a win32k.sys system call, to bypass the security sandbox.To read this article in full or to leave a comment, please click here

Google clashes with Microsoft over Windows flaw disclosure

Google and Microsoft are butting heads over the disclosure of vulnerabilities. On Monday, Google revealed a critical flaw in Windows after it gave Microsoft a ten-day window to warn the public about it.Google posted about the zero-day vulnerability on its security blog, saying Microsoft had yet to publish a fix or issue an advisory about the software flaw."This vulnerability is particularly serious because we know it is being actively exploited," Google said. It lets hackers exploit a bug in the Windows kernel, via a win32k.sys system call, to bypass the security sandbox.To read this article in full or to leave a comment, please click here

Improve IT security: Start with these 10 topics

You want to be more responsible about IT security in your organization, but where do you start? May I suggest your first step be understanding these topics more thoroughly. This is list isn’t exhaustive. It’s only a beginning:1. DNS and DNSSEC: The biggest games in cyber war are hitting DNS providers. DNS can be compromised in many simple ways, but Domain Name System Security Extensions (DNSSEC) thwarts these—at the cost of understanding how it works, how to deploy it and how it’s maintained. There are ways to understand if your own organization is threatened with DDoS attacks. Study them. To read this article in full or to leave a comment, please click here

Improve IT security: Start with these 10 topics

You want to be more responsible about IT security in your organization, but where do you start? May I suggest your first step be understanding these topics more thoroughly. This is list isn’t exhaustive. It’s only a beginning:1. DNS and DNSSEC: The biggest games in cyber war are hitting DNS providers. DNS can be compromised in many simple ways, but Domain Name System Security Extensions (DNSSEC) thwarts these—at the cost of understanding how it works, how to deploy it and how it’s maintained. There are ways to understand if your own organization is threatened with DDoS attacks. Study them. To read this article in full or to leave a comment, please click here