Archive

Category Archives for "Networking"

Four free tools for handling Amazon Web Services security incident response

Responding to security incidents that involve deployments within Amazon Web Services is a lot different from responding to incidents that happen on corporate-owned gear, and two researchers have come up with free tools to make that process easier.Obtaining forensic evidence is different, primarily because security pros can’t obtain physical access to the machines on which their AWS instances are running.+More on Network World: Black Hat: 9 free security tools for defense & attacking+To read this article in full or to leave a comment, please click here

Open vSwitch finds new home at the Linux Foundation

The developers of open source virtual networking technology Open vSwitch (OVS) said this week they will move future development to the Linux Foundation Project.The move releases Open vSwitch, which usually runs on hypervisors, up to a greater number of developers who can use it to further develop tools and applications for the virtual networking world. OVS works on a wide variety of systems, including Linux, DPDK, Hyper-V, and FreeBSD. The technology is used in a variety of Software Defined Networking applications, including NFV and network virtualization and it is the most widely used networking back-end in OpenStack, the foundation said.To read this article in full or to leave a comment, please click here

66% off CrossOver, and Run Windows Apps On Your Mac – Deal Alert

It’s no secret that Windows, Mac, and Linux are the three major operating systems dominating the market today—and that their incompatibility often creates issues for users. For the inevitable moments when you need to use a Windows app on your Linux or Mac, there’s CrossOver 15 for Mac and Linux, now only $19.99.With CrossOver 15, you can launch Windows apps, from productivity software to games, natively on your Mac or Linux PC. You’ll be able to operate Windows software at native speed and integrate seamlessly with your native desktop environment, as well as backup your software and move it between machines with bottles.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Big data for guide dogs. IBM helps train service dogs

I love the idea of big data. Being able to derive insights from the ever-increasing stream of information out there is an awesome promise. But alas, a good proportion of the case studies we hear about big data end up being about how big data is used to tailor sales and marketing messages and eke out a few cents extra on every transaction. It may be the reality of our commercial world, but it's sad to see a promising technology applied this way.So, it was nice to receive a pitch from IBM's cloud computing division about how it is partnering with Guiding Eyes for the Blind to bring dogs and data together. While it may sound like an April Fool's joke, IBM is taking structured and unstructured canine data and putting it on the IBM cloud to crunch numbers and generate insights.To read this article in full or to leave a comment, please click here

The U.S. government now has an open source policy—but it doesn’t go far enough

This week, the U.S. government unveiled its official Federal Source Code policy.Here is, in my opinion, the key excerpt from the announcement: “The policy, which incorporates feedback received during the public comment period, requires new custom-developed source code developed specifically by or for the Federal Government to be made available for sharing and re-use across all Federal agencies. It also includes a pilot program that will require Federal agencies to release at least a portion of new custom-developed Federal source code to the public and support agencies in going beyond that minimum requirement.”To read this article in full or to leave a comment, please click here

How well does social engineering work? One test returned 150%

White hat hackers see companies at their worst.  It is, after all, their job to expose weaknesses. Network World Editor in Chief John Dix recently chatted with penetration testing expert Josh Berry, Senior Technology Manager at Accudata Systems, an IT consulting and integration firm based in Houston, to learn more about the attack techniques he encounters and what he advises clients do to fight back. Josh Berry, Senior Technology Manager, Accudata SystemsTo read this article in full or to leave a comment, please click here

How well does social engineering work? One test returned 150%

White hat hackers see companies at their worst.  It is, after all, their job to expose weaknesses. Network World Editor in Chief John Dix recently chatted with penetration testing expert Josh Berry, Senior Technology Manager at Accudata Systems, an IT consulting and integration firm based in Houston, to learn more about the attack techniques he encounters and what he advises clients do to fight back. Josh Berry, Senior Technology Manager, Accudata SystemsTo read this article in full or to leave a comment, please click here

Network and system analytics as a Docker service

The diagram shows how new and existing cloud based or locally hosted orchestration, operations, and security tools can leverage the sFlow-RT analytics service to gain real-time visibility. Network visibility with Docker describes how to install open source sFlow agents to monitor network activity in a Docker environment in order to gain visibility into Docker Microservices.

The sFlow-RT analytics software is now on Docker Hub, making it easy to deploy real-time sFlow analytics as a Docker service:
docker run -p 8008:8008 -p 6343:6343/udp -d sflow/sflow-rt
Configure standard sFlow Agents to stream telemetry to the analyzer and retrieve analytics using the REST API on port 8008.

Increase memory from default 1G to 2G:
docker run -e "RTMEM=2G" -p 8008:8008 -p 6343:6343/udp -d sflow/sflow-rt
Set System Property to enable country lookups when Defining Flows:
docker run -e "RTPROP=-Dgeo.country=resources/config/GeoIP.dat" -p 8008:8008 -p 6343:6343/udp -d sflow/sflow-rt
Run sFlow-RT Application. Drop the -d option while developing an application to see output of logging commands and use control-c to stop the container.
docker run -v /Users/pp/my-app:/sflow-rt/app/my-app -p 8008:8008 -p 6343:6343/udp -d sflow/sflow-rt
A simple Dockerfile can be used to generate a new image that includes the application:
FROM sflow/sflow-rt:latest
COPY /Users/pp/my-app /sflow-rt/app
Similarly, Continue reading

What will space living look like? NASA picks 6 habitat prototypes

NASA this week picked six companies to develop prototype deep space habitats that astronauts could somewhat comfortably live in on long space journeys – particularly to Mars.According to NASA, an effective habitat contains “pressurized volume plus an integrated array of complex systems and components that include a docking capability, environmental control and life support systems, logistics management, radiation mitigation and monitoring, fire safety technologies, and crew health capabilities.” +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2016 (so far!)To read this article in full or to leave a comment, please click here

How to get started with a private Windows Store for Business

The Windows Store for Business is a counterpart to the consumer Windows Store so familiar to home users. That means you can find the same universal Windows Platform apps in both stores. One difference is that the Store for Business works only with devices running Windows 10 or Windows 10 Mobile, where the consumer Windows Store supports devices running Windows 8 and 8.1 as well.To read this article in full or to leave a comment, please click here(Insider Story)

CISO Portfolio Management

Enterprise CISOs are in an unenviable position.  Given today’s dangerous threat landscape and rapidly evolving IT initiatives, CISOs have a long list of tasks necessary for protecting sensitive data and IT assets.  At the same time however, most organizations are operating with a shortage of skilled cybersecurity professionals.  According to ESG research, 46% of organizations claim that they have a “problematic shortage” of cybersecurity skills in 2016 (note: I am an ESG employee).In the past, CISOs (and let’s face it, all cybersecurity professionals) were control freaks often suspicious of vendors and service providers.  Faced with today’s overwhelming responsibilities however, many CISOs I’ve spoken with lately say they’ve changed their tunes and have adopted more of a portfolio management approach to their jobs. To read this article in full or to leave a comment, please click here

CISOs adopt a portfolio management approach for cybersecurity

Enterprise CISOs are in an unenviable position. Given today’s dangerous threat landscape and rapidly evolving IT initiatives, CISOs have a long list of tasks necessary for protecting sensitive data and IT assets. At the same time, however, most organizations are operating with a shortage of skilled cybersecurity professionals.  According to ESG research, 46 percent of organizations claim  they have a “problematic shortage” of cybersecurity skills in 2016.In the past, CISOs (and let’s face it, all cybersecurity professionals) were control freaks often suspicious of vendors and service providers. Faced with today’s overwhelming responsibilities, however, many CISOs I’ve spoken with lately say they’ve changed their tune and have adopted more of a portfolio management approach to their jobs. To read this article in full or to leave a comment, please click here

ForeScout simplifies IoT security

Smart lighting, smart meters, smart building systems and other smart endpoints. It seems every device today is a “smart” device.The level of intelligence for the various devices can vary greatly. For example, a smart automobile must make far more autonomous decisions than, say, a wearable fitness monitor. While the range of devices varies greatly, all smart devices have in one thing in common: they are connected to a network. It’s this vast number of connected endpoints—50 billion by 2020, according to ZK Research—that is the foundation for the Internet of Things (IoT).+ Also on Network World: IoT security threats and how to handle them +To read this article in full or to leave a comment, please click here