Archive

Category Archives for "Networking"

Many hospitals transmit your health records unencrypted

About 32% of hospitals and 52% of non-acute providers -- such as outpatient clinics, rehabilitation facilities and physicians' offices -- are not encrypting data in transit, according to a new survey.Additionally, only 61% of acute providers and 48% of non-acute providers are encrypting data at rest.This "leaves the door wide open to potential tampering and corruption of the data, in addition to a large potential for a breach," the report stated. "If a computer, laptop, thumb drive, or backup were to be stolen, any person would be able to access such information." HIMSS The survey, conducted by the Healthcare Information and Management Systems Society (HIMSS), a Chicago-based trade group for the health information technology sector, also revealed that many of the facilities' networks don't even have firewalls.To read this article in full or to leave a comment, please click here

Many hospitals transmit your health records unencrypted

About 32% of hospitals and 52% of non-acute providers -- such as outpatient clinics, rehabilitation facilities and physicians' offices -- are not encrypting data in transit, according to a new survey.Additionally, only 61% of acute providers and 48% of non-acute providers are encrypting data at rest.This "leaves the door wide open to potential tampering and corruption of the data, in addition to a large potential for a breach," the report stated. "If a computer, laptop, thumb drive, or backup were to be stolen, any person would be able to access such information." HIMSS The survey, conducted by the Healthcare Information and Management Systems Society (HIMSS), a Chicago-based trade group for the health information technology sector, also revealed that many of the facilities' networks don't even have firewalls.To read this article in full or to leave a comment, please click here

Many hospitals transmit your health records unencrypted

About 32% of hospitals and 52% of non-acute providers -- such as outpatient clinics, rehabilitation facilities and physicians' offices -- are not encrypting data in transit, according to a new survey.Additionally, only 61% of acute providers and 48% of non-acute providers are encrypting data at rest.This "leaves the door wide open to potential tampering and corruption of the data, in addition to a large potential for a breach," the report stated. "If a computer, laptop, thumb drive, or backup were to be stolen, any person would be able to access such information." HIMSS The survey, conducted by the Healthcare Information and Management Systems Society (HIMSS), a Chicago-based trade group for the health information technology sector, also revealed that many of the facilities' networks don't even have firewalls.To read this article in full or to leave a comment, please click here

Side channel power, the new security front

Side channels used to be avenues for cyber attacks. Today, one side channel has been elevated to a new front line for cyber defense, and it may go on to be a bulwark for the internet of things (IoT).To read this article in full or to leave a comment, please click here(Insider Story)

Linux at 25: Containers and unikernels prove less is more

If there’s been one constant through Linux’s 25 years in the wild, it’s change. The kernel itself has been through dozens of revisions; Linux distributions for most every use case have emerged; and the culture of Linux has evolved from weekend hobby project to an underpinning of worldwide IT infrastructure.Now we’re seeing the first versions of the next wave of Linux change. Containerization, unikernels, and other experiments with form are reshaping Linux from the inside out, opening up unheralded avenues for how the open source operating system that could (and did!) can do it all over again.To read this article in full or to leave a comment, please click here

5 missing features we wish were in Android 7.0 Nougat

Android 7.0 Nougat is beginning its slow rollout to Android devices around the world. Most phones will take time to update, but Nexus owners can already play with Google’s latest and greatest OS. Nougat brings some cool new features like split-screen multitasking, bundled notifications, and Daydream VR. Even with all the improvements, there are still some nagging deficiencies in the Android feature set. Here are the five most glaring omissions from Android 7.0.Restart option Come on, Google. You’re just being stubborn.To read this article in full or to leave a comment, please click here

The best educational apps and games to jumpstart the school year

Learning is fun!Image by Derek WalterParents everywhere grapple with the question of how much “screen time” to allow for their children—and part of the challenge to this question stems from how many apps and games are mindless diversions.So to help you out, we’ve pulled together a group of higher-quality choices that are both educational and fun. Any guilt you have about screen time will be vastly diminished when your kid is learning about the solar system, practicing multiplication, or using logic to solve a puzzle. Check out some of our top choices for making learning something that can happen anytime.To read this article in full or to leave a comment, please click here

Imperva: Application layer DDoS attacks are on the rise.

Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says.One such attack generated 8.7Gbps at its peak, “unheard of in relation to application layer assaults,” in an effort to thread its way through the DDoS mitigations that had been set up to defend against such attacks, according to Imperva’s “DDoS Threat Landscape Report 2015-2016” released today.Application layer attacks can be measured in responses per second required from the application targeted, and they generally require less volume than network layer attacks to succeed, the report says. That means they require fewer botnet resources, if botnets are the platform from which the attack is launched.To read this article in full or to leave a comment, please click here

Imperva: Application layer DDoS attacks are on the rise.

Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says.One such attack generated 8.7Gbps at its peak, “unheard of in relation to application layer assaults,” in an effort to thread its way through the DDoS mitigations that had been set up to defend against such attacks, according to Imperva’s “DDoS Threat Landscape Report 2015-2016” released today.Application layer attacks can be measured in responses per second required from the application targeted, and they generally require less volume than network layer attacks to succeed, the report says. That means they require fewer botnet resources, if botnets are the platform from which the attack is launched.To read this article in full or to leave a comment, please click here

IDG Contributor Network: World Economic Forum goes for blockchain

Distributed Ledger Technology (DLT), more commonly known as blockchain, has the potential to revolutionize financial, investment and insurance technology infrastructure and networks. It will form one of the foundations of “next-generation financial services infrastructure,” the World Economic Forum (WEF) says in a new report.The WEF pulls together political and business leaders to focus on global issues such as technology changes.+ Also on Network World: Blockchain: You’ve got questions; we’ve got answers +To read this article in full or to leave a comment, please click here

IDG Contributor Network: World Economic Forum goes for blockchain

Distributed Ledger Technology (DLT), more commonly known as blockchain, has the potential to revolutionize financial, investment and insurance technology infrastructure and networks. It will form one of the foundations of “next-generation financial services infrastructure,” the World Economic Forum (WEF) says in a new report.The WEF pulls together political and business leaders to focus on global issues such as technology changes.+ Also on Network World: Blockchain: You’ve got questions; we’ve got answers +To read this article in full or to leave a comment, please click here

Why Google Slows Fibre Rollout

Laying fiber is, it turns out, pretty expensive. That’s one reason why expansion of Google Fiber’s ambitious project to bring ultrafast internet to U.S. cities around has been placed on hold. The company has spent spent hundreds of millions of dollars laying fiber-optic cablesto bring Internet service as much as 100 times faster than average high-speed wireless […]

The post Why Google Slows Fibre Rollout appeared first on EtherealMind.

The State of Telemetry in Cloud Networking

The hype of Software Defined Networking (SDN) and its associated analytics is alive and well. Many are advocating changing the way monitoring is done.  Are we ready for re-invention? How should one react? Or should we plan better? What happens to decades of network management that are habitual? Legacy vendors understandably feel defensive, declaring new marketing visions and paradigms, while new and innovative vendors are delivering real functionality that meets customer needs! At Arista, we saw the emergence of a need for better visibility and monitoring in 2010, with exponential growth of workloads in the cloud to bring together many forms of telemetry. We have been deploying Arista Tracers with EOS ®  for over five years, and now we are entering the next generation of real-time telemetry.

Arista plans its own take on all-seeing network software

It’s been a good year for IT administrators who want more information, more often, about what’s happening on their networks.In April, startups Veriflow and Nyansa introduced new ways to determine whether a network is doing what it should. In June, Cisco Systems unveiled its Tetration Analytics appliance to collect and analyze information about all parts of a data center in real time.To read this article in full or to leave a comment, please click here

Arista plans its own take on all-seeing network software

It’s been a good year for IT administrators who want more information, more often, about what’s happening on their networks.In April, startups Veriflow and Nyansa introduced new ways to determine whether a network is doing what it should. In June, Cisco Systems unveiled its Tetration Analytics appliance to collect and analyze information about all parts of a data center in real time.To read this article in full or to leave a comment, please click here

Arista plans its own take on all-seeing network software

It’s been a good year for IT administrators who want more information, more often, about what’s happening on their networks.In April, startups Veriflow and Nyansa introduced new ways to determine whether a network is doing what it should. In June, Cisco Systems unveiled its Tetration Analytics appliance to collect and analyze information about all parts of a data center in real time.To read this article in full or to leave a comment, please click here