Archive

Category Archives for "Networking"

10 ways to secure a mobile workforce

Super mobile workerImage by ThinkstockWe are entering the age of “supermobility,” in which mobile devices will provide all of the tools and technology that employees need to be productive on the go. And while workplace flexibility and convenience are at an all-time high, super-mobile employees are actually putting enormous amounts of company data at risk.To read this article in full or to leave a comment, please click here

10 ways to secure a mobile workforce

Super mobile workerImage by ThinkstockWe are entering the age of “supermobility,” in which mobile devices will provide all of the tools and technology that employees need to be productive on the go. And while workplace flexibility and convenience are at an all-time high, super-mobile employees are actually putting enormous amounts of company data at risk.To read this article in full or to leave a comment, please click here

How to mitigate hackers who farm their victims

Nation-states and savvy criminal hackers don’t pull uninformed, spur-of-the-moment smash-and-grab jobs on data networks. They reconnoiter and position themselves to slowly implement precise surgical maneuvers to exfiltrate your information treasures. Most of these attackers are capable of ensuring you remain unaware of their movements until it is to their benefit for you to know.High-profile attacks that leveraged extended dwell time inside the networks of large retail chains such as Target are examples of how hackers farm or manage victim organizations in this manner.Hackers farm their targets by maintaining a veiled presence in sensitive places in and around government and enterprise networks, revealing their position in a calculated way at an optimal time to achieve some strategic goal, says Danny Rogers, CEO at Terbium Labs.To read this article in full or to leave a comment, please click here

How to mitigate hackers who farm their victims

Nation-states and savvy criminal hackers don’t pull uninformed, spur-of-the-moment smash-and-grab jobs on data networks. They reconnoiter and position themselves to slowly implement precise surgical maneuvers to exfiltrate your information treasures. Most of these attackers are capable of ensuring you remain unaware of their movements until it is to their benefit for you to know.High-profile attacks that leveraged extended dwell time inside the networks of large retail chains such as Target are examples of how hackers farm or manage victim organizations in this manner.Hackers farm their targets by maintaining a veiled presence in sensitive places in and around government and enterprise networks, revealing their position in a calculated way at an optimal time to achieve some strategic goal, says Danny Rogers, CEO at Terbium Labs.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Always be prepared: Monitor, analyze and test your security

This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity.We started down the path of building a solid security foundation by taking inventory of hardware and software, we looked at vulnerability assessment and administrative privileges, and we discussed how to build malware defenses. We also explored how to create a data recovery plan, how to protect your data, and the importance of monitoring and training employees.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Always be prepared: Monitor, analyze and test your security

This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity.We started down the path of building a solid security foundation by taking inventory of hardware and software, we looked at vulnerability assessment and administrative privileges, and we discussed how to build malware defenses. We also explored how to create a data recovery plan, how to protect your data, and the importance of monitoring and training employees.To read this article in full or to leave a comment, please click here

Nutanix CEO skewers box-based hyperconvergence rivals

Nutanix founder and CEO Dheeraj Pandey doesn’t want you to get too excited by today’s hyperconverged infrastructure offerings because they’re just ‘a pit stop’ on the way to making all infrastructure invisible. Pandey, whose company is preparing for an initial public offering, talked with IDG Chief Content Officer John Gallant about the competitive landscape in hyperconvergence today and he pulled no punches in assessing rivals like Simplivity and VCE. In Pandey’s view, only VMware is on the same path of building, essentially, the operating system for hybrid cloud but Nutanix is starting from a clean slate. Pandey also discussed Nutanix’s partnership with Dell Technologies and explained why Cisco has no love for his company these days.To read this article in full or to leave a comment, please click here(Insider Story)

Nutanix CEO skewers box-based hyperconvergence rivals

Nutanix founder and CEO Dheeraj Pandey doesn’t want you to get too excited by today’s hyperconverged infrastructure offerings because they’re just ‘a pit stop’ on the way to making all infrastructure invisible. Pandey, whose company is preparing for an initial public offering, talked with IDG Chief Content Officer John Gallant about the competitive landscape in hyperconvergence today and he pulled no punches in assessing rivals like Simplivity and VCE. In Pandey’s view, only VMware is on the same path of building, essentially, the operating system for hybrid cloud but Nutanix is starting from a clean slate. Pandey also discussed Nutanix’s partnership with Dell Technologies and explained why Cisco has no love for his company these days.To read this article in full or to leave a comment, please click here(Insider Story)

How Do I Get a Grasp of SDN and NFV?

One of my readers had problems getting the NFV big picture (and how it relates to SDN):

I find the topic area of SDN and NFV a bit overwhelming in terms of information, particularly the NFV bit.

NFV is a really simple concept (network services packaged in VM format), what makes it complex is all the infrastructure you need around it.

Read more ...

IBM promises a one-stop analytics shop with AI-powered big data platform

Big data is in many ways still a wild frontier, requiring wily smarts and road-tested persistence on the part of those hoping to find insight in all the petabytes. On Tuesday, IBM announced a new platform it hopes will make things easier.Dubbed Project DataWorks, the new cloud-based platform is the first to integrate all types of data and bring AI to the table for analytics, IBM said.Project DataWorks is available on IBM's Bluemix cloud platform and aims to foster collaboration among the many types of people who need to work with data. Tapping technologies including Apache Spark, IBM Watson Analytics and the IBM Data Science Experience launched in June, the new offering is designed to give users self-service access to data and models while ensuring governance and rapid-iteration capabilities.To read this article in full or to leave a comment, please click here

Yahoo’s claim of ‘state-sponsored’ hackers meets with skepticism

Yahoo has blamed its massive data breach on a "state-sponsored actor." But the company isn't saying why it arrived at that conclusion. Nor has it provided any evidence.The lingering questions are causing some security experts to wonder why Yahoo isn't offering more details on a hack that stole account information from 500 million users."I think there's a lot of fishiness going on here," said Michael Lipinski, the chief security strategist at Securonix.Yahoo didn't respond to a request for comment. The company has protocols in place that can detect state-sponsored hacking into user accounts. In a December 2015 blog post, the company outlined its policy, saying it will warn users when this is suspected. To read this article in full or to leave a comment, please click here

Yahoo’s claim of ‘state-sponsored’ hackers meets with skepticism

Yahoo has blamed its massive data breach on a "state-sponsored actor." But the company isn't saying why it arrived at that conclusion. Nor has it provided any evidence.The lingering questions are causing some security experts to wonder why Yahoo isn't offering more details on a hack that stole account information from 500 million users."I think there's a lot of fishiness going on here," said Michael Lipinski, the chief security strategist at Securonix.Yahoo didn't respond to a request for comment. The company has protocols in place that can detect state-sponsored hacking into user accounts. In a December 2015 blog post, the company outlined its policy, saying it will warn users when this is suspected. To read this article in full or to leave a comment, please click here

GE, Bosch and open source could bring more IoT tools

Partnerships that could shape the internet of things for years are being forged just as enterprises fit IoT into their long-term plans.A majority of organizations have included IoT as part of their strategic plans for the next two to three years, IDC said last week. No one vendor can meet the diverse IoT needs of all those users, so they're joining forces and also trying to foster broader ecosystems. General Electric and Germany's Bosch did both on Monday.The two companies, both big players in industrial IoT, said they will establish a core IoT software stack based on open-source software. They plan to integrate parts of GE's Predix operating system with the Bosch IoT Suite in ways that will make complementary software services from each available on the other.To read this article in full or to leave a comment, please click here

Microsoft confirms Windows 10 adoption slowdown

Microsoft today acknowledged that the Windows 10 adoption pace had slowed when it claimed the new operating system was running on approximately 400 million devices.The company reset the Windows 10 uptake status on the same day it kicked off the 2016 edition of its Ignite conference in Atlanta.Microsoft's last Windows 10 update was at the end of June, a month before it halted the free upgrade for consumers and small businesses running Windows 7 or Windows 8.1. Then Microsoft pegged the number of "active devices" -- a metric of those machines that ran the OS at least once in the past four weeks -- at 350 million.The increase of 50 million over more than 12 weeks -- or about 17 million every four weeks -- was lower than during the free upgrade offer period. For example, in the eight weeks from May 5 to June 29, Microsoft claimed 50 million active users were added to the Windows 10 rolls, or 25 million every four weeks.To read this article in full or to leave a comment, please click here

Microsoft commits to running data centers off 50% renewable energy by 2018

Microsoft announced it plans to power its data centers around the world using 50% renewable energy by 2018.The company also plans to boost its use of renewable power for its data centers to 60% by the early 2020s.Rob Bernard, Microsoft's chief environmental & cities strategist, made the announcement at the VERGE16 conference last week.Bernard's comments during a conference keynote were a reiteration of a commitment earlier this year by the company to increase its use of clean energy.To read this article in full or to leave a comment, please click here

Microsoft commits to running data centers off 50% renewable energy by 2018

Microsoft announced it plans to power its data centers around the world using 50% renewable energy by 2018.The company also plans to boost its use of renewable power for its data centers to 60% by the early 2020s.Rob Bernard, Microsoft's chief environmental & cities strategist, made the announcement at the VERGE16 conference last week.Bernard's comments during a conference keynote were a reiteration of a commitment earlier this year by the company to increase its use of clean energy.To read this article in full or to leave a comment, please click here

34% off Master Lock Bluetooth Keyless Outdoor Padlock – Deal Alert

Use your smartphone to open this padlock from Master Lock. Share access, monitor access history and receive alerts if someone is tampering. Designed for outdoor use, its shackle offers 2 inch vertical clearance and is made of boron for maximum resistance to cutting and sawing. The lock features alternate methods of access for when Bluetooth isn't available or the replaceable battery dies. Its typical list price of $89 has been reduced 34% to $59 (see on Amazon). An indoor version is available, also at a discount (28% off, $50 -- See on Amazon).To read this article in full or to leave a comment, please click here

34% off Master Lock Bluetooth Keyless Outdoor Padlock – Deal Alert

Use your smartphone to open this padlock from Master Lock. Share access, monitor access history and receive alerts if someone is tampering. Designed for outdoor use, its shackle offers 2 inch vertical clearance and is made of boron for maximum resistance to cutting and sawing. The lock features alternate methods of access for when Bluetooth isn't available or the replaceable battery dies. Its typical list price of $89 has been reduced 34% to $59 (see on Amazon). An indoor version is available, also at a discount (28% off, $50 -- See on Amazon).To read this article in full or to leave a comment, please click here

As Adobe, Microsoft Azure ink cloud partnership, Amazon looms

To kick off his company’s Ignite conference in Atlanta this week, Microsoft CEO Satya Nadella announced that Adobe will run three of its most popular software as a service apps on the Microsoft Azure IaaS cloud.The move is a power play by Microsoft and Adobe on multiple fronts, analysts say. But, it should also be taken with a grain of salt: A spokesperson for Adobe confirmed that the company has a “large footprint” with AWS and it expects to use both AWS and Azure moving forward. In that sense, it shows the dynamic nature of partnerships across the cloud market.+MORE AT NETWORK WORLD: Docker containers are coming to Windows | Review: Windows Server 2016 steps up security, cloud support +To read this article in full or to leave a comment, please click here