At the Black Hat conference in Las Vegas, CSO’s Steve Ragan chats with Itzik Kotler, CTO and co-founder of SafeBreach, about why many companies end up failing in their security risk assessments, as well as how some companies are tackling these failures to improve their overall security.
If you think PC sales are in the toilet, you should look at what's happening in the tablet world. For the second quarter in a row, sales are down by double digits as consumers and businesses alike seek something more functional.Tablets have a bunch of things going against them. Primarily, the problem is they are a consumption device, not a creation device, and people want something more powerful. In addition, phablets and large smartphones have eaten into the market, there are no compelling reasons to upgrade because new generations are only a little better than the old, and the chief advocate for tablets, Steve Jobs, is no longer among us.The result, according to IDC, is a 12.3 percent decline in sales year over year for the second quarter of 2016. That comes on the heels of a 14.7 percent decline in Q1. IDC said this is due to vendors restructuring their product lines and customers delaying purchases as the market shifts focus towards productivity-oriented devices such as detachables.To read this article in full or to leave a comment, please click here
High-flying salaries in some unexpected placesImage by Greg GjerdingenBefore moving to this top city for InfoSec pay, you might want to read the latest John Sanford novel, brace for a bitter cold winter and develop a taste for tater tot hot dish. Yes, that's right, if you want to get the most bang for your InfoSec salary buck, a move to Minneapolis might be in your future.To read this article in full or to leave a comment, please click here(Insider Story)
Technology is moving the workplace along at lightning speed and not all businesses are ready to catch up. But that modernization is key to the future of work, according to a recent study commissioned by Dell and Intel.
Penn Schoen Berland (PSB) conducted 3,801 online interviews earlier this year, speaking with individuals working in nine different markets, including education, government, financial services, healthcare, manufacturing, media, and entertainment and retail. They focused on the future of work and what these workers expect from their employers moving forward. "Not only is technology impacting the future office, it's redefining the office and greatly influencing the way we all currently work," says Kelli Hodges, global manager, Mobility at Dell.To read this article in full or to leave a comment, please click here
Net neutrality foes work to get the U.S. Supreme Court to weigh in and settle the matter of network neutrality, perhaps the most contentious issue in technology policy over the last decade.[ Related: U.S. appeals court upholds net neutrality rules, but fight is not over ]It is certainly possible, because opponents of the policy advanced by the Federal Communications Commission aren't conceding the fight after their recent legal setback.Last week, U.S. Telecom, CTIA and other trade organizations and allied groups appealed to a federal appeals court to rehear the case in a proceeding that would involve all active judges, not just the three-judge panel that upheld the FCC's open Internet order in June by a 2-1 split.To read this article in full or to leave a comment, please click here
Net neutrality foes work to get the U.S. Supreme Court to weigh in and settle the matter of network neutrality, perhaps the most contentious issue in technology policy over the last decade.[ Related: U.S. appeals court upholds net neutrality rules, but fight is not over ]It is certainly possible, because opponents of the policy advanced by the Federal Communications Commission aren't conceding the fight after their recent legal setback.Last week, U.S. Telecom, CTIA and other trade organizations and allied groups appealed to a federal appeals court to rehear the case in a proceeding that would involve all active judges, not just the three-judge panel that upheld the FCC's open Internet order in June by a 2-1 split.To read this article in full or to leave a comment, please click here
How technology convergence can help CIOs do more with lessImage by ThinkstockCIOs and other IT decision-makers are used to having to do more with less. In the world of big data, they may be able to achieve orders-of-magnitude cost savings and productivity gains due to the convergence of development, IT ops and business intelligence (BI) strategy, exploiting advancements in open source software, distributed computing, cloud economics and microservices development.To read this article in full or to leave a comment, please click here
Enterprises are eager to get Windows 10 onto their workers' PCs. Or they're in no rush.They see the just-released Anniversary Update as a major milestone. Or they don't.And some expect to have a majority of their PCs running Windows 10 in just a year from now. Or they believe it'll take twice that long.Recent surveys of IT administrators, managers and professionals displayed those opinions, and more, showing little consensus on anything other than the broadest trends that first, corporate IT likes Windows 10 a lot more than it did Windows 8, and second, Windows 10 will replace Windows 7 as the go-to operating system.Windows 10's adoption in the enterprise will be critical to the OS's success, especially from this point forward: The consumer-centric free upgrade offer has expired and the historic slump in PC shipments, mostly blamed on consumers' refusal to buy new systems to replace aged ones, continues unabated.To read this article in full or to leave a comment, please click here
Stop me if you’ve heard this before, but Gartner’s IaaS Magic Quadrant is out and Amazon Web Services is the clear the market leader, with Microsoft Azure is giving it a run for its money.It’s been a similar narrative for the past few years, but today Gartner basically said the market is status quo in 2016. The research firm’s MQ report is seen as an annual benchmark for the industry, a sort of checkpoint to see where the various vendors sit. Once again, it’s Amazon on top, Microsoft in second and a whole boatload of other vendors lumped into a category of “everyone else.”AWS: The ‘safe choice’ Amazon Web Service’s IaaS cloud is so mature and feature-rich that it’s defaulted to become the “safe choice” in the IaaS cloud market, Gartner says. AWS’s offerings available to the market are not only “many times the aggregate size of all other providers in the market,” Gartner says, but the company has a “multi-year” competitive advantage over every other competitor too.To read this article in full or to leave a comment, please click here
At the Black Hat conference in Las Vegas, CSO’s Steve Ragan talks with Stephanie Carruthers, owner of Snow Offensive Security, about why business email compromise (aka CEO fraud) works so well against companies. She also discusses several tricks that phishers will use to gain trust among corporate employees when preparing for an attack.
This innovative Tracer360 visibility vest averages 5 out of 5 stars on Amazon from over 325 customers (90% rate a perfect 5 stars -- read reviews). It is designed for maximum comfort and visibility year-round while cycling, running, walking, on a motorcycle or any other application where visibility is a concern, particularly at night. It features a full 360 degrees of illumination and 3M reflectivity, designed to catch the attention of the most distracted drivers up to 1/4 mile away. It flashes, strobes or blinks and features a variety of colors, fully selectable/adjustable even while running. Lightweight and breathable, this vest won't trap moisture and can be worn year-round over a jacket just as easily as a t-shirt. Its list price of $69.99 has been reduced by 26% to $51.50. See the highly rated and discounted Tracer360 illumination vest on Amazon.To read this article in full or to leave a comment, please click here
At the Black Hat conference in Las Vegas, CSO’s Steve Ragan chats with Steven Grossman of Bay Dynamics about how companies can survive the avalanche of information security hype and buzzwords when speaking with vendors who are promising everything.
At the Black Hat conference in Las Vegas, CSO's Steve Ragan speaks with Israel Barak, CISO at Cybereason, about the commoditization of cybercrime, the market for compromised servers and endpoints, and what makes one target more valuable than another.
Allowing algorithms to curate our lives might have unintended consequences, an Australian researcher says.Algorithms are used throughout our interaction with technology. They range from those used by Facebook to tell us which friends we find most interesting, to Google’s Now product that reminds us of meetings we may care so little about that we’ve forgotten about them. The pictures we see in social media photo streams are dictated by algorithms, as are search results and the music we listen to on online radio stations.+ Also on Network World: 10 amazing algorithms +To read this article in full or to leave a comment, please click here
When a computer connects to a public Wi-Fi network or an untrusted LAN, a malicious actor could potentially compromise a browser’s HTTPS connection and eavesdrop on URLs such as Dropbox, Google Drive URLs or Password reset URLs.The fix is easy for a consumer: un-checking the automatic detect setting. But an enterprise user might need to ask the IT department to eliminate this risk. Windows, Mac and Linux computers are all at risk.Windows: How to reduce the risk of URL hijack To prevent this HTTPS URL hijack on a Windows computer, open the Control Panel and select Internet Properties. Then select the Connections Tab, and in it the LAN settings button. Un-check Automatically detect settings.To read this article in full or to leave a comment, please click here
When a computer connects to a public Wi-Fi network or an untrusted LAN, a malicious actor could potentially compromise a browser’s HTTPS connection and eavesdrop on URLs such as Dropbox, Google Drive URLs or Password reset URLs.The fix is easy for a consumer: un-checking the automatic detect setting. But an enterprise user might need to ask the IT department to eliminate this risk. Windows, Mac and Linux computers are all at risk.Windows: How to reduce the risk of URL hijack To prevent this HTTPS URL hijack on a Windows computer, open the Control Panel and select Internet Properties. Then select the Connections Tab, and in it the LAN settings button. Un-check Automatically detect settings.To read this article in full or to leave a comment, please click here