Archive

Category Archives for "Networking"

Two men fall off San Diego cliff playing Pokemon Go, just as I predicted

On Monday, my brother who lives in San Diego sent me an email with the subject line: “Third time this week.” What had happened for the third time was that someone fell off the oceanside cliff near his home, something that happens there with frightening regularity. I asked my brother why this keeps happening. “Gravity,” was his reply. Me: “Ha-ha. I mean are they just trying to get a better look? Or flying one of those stupid flying things? Or playing Pokemon Go? (Oh, sweet heaven, that would be such a *great* rumor to start today even if it's not true.)” Two days later it’s true, though not at the exact same cliff.To read this article in full or to leave a comment, please click here

Microsoft wins appeal over US government access to emails held overseas

A U.S. appeals court has quashed a search warrant that would have required Microsoft to disclose contents of emails stored on a server in Ireland, in a case that has broad ramifications for privacy, diplomatic relations and the ability of American companies to sell web services abroad."We think Microsoft has the better of the argument," said Circuit Court Judge Sarah Carney, in an opinion written for a three-judge panel of the U.S. Court of Appeals for the Second Circuit in New York.The panel based its judgment on the 30-year-old U.S. Stored Communications Act. The act, Carney wrote, "does not authorize courts to issue and enforce against U.S.‐based service providers warrants for the seizure of customer e‐mail content that is stored exclusively on foreign servers." The opinion was posted Thursday.To read this article in full or to leave a comment, please click here

Microsoft wins appeal over US government access to emails held overseas

A U.S. appeals court has quashed a search warrant that would have required Microsoft to disclose contents of emails stored on a server in Ireland, in a case that has broad ramifications for privacy, diplomatic relations and the ability of American companies to sell web services abroad."We think Microsoft has the better of the argument," said Circuit Court Judge Sarah Carney, in an opinion written for a three-judge panel of the U.S. Court of Appeals for the Second Circuit in New York.The panel based its judgment on the 30-year-old U.S. Stored Communications Act. The act, Carney wrote, "does not authorize courts to issue and enforce against U.S.‐based service providers warrants for the seizure of customer e‐mail content that is stored exclusively on foreign servers." The opinion was posted Thursday.To read this article in full or to leave a comment, please click here

When COWs fly: An AT&T drone experiment

You might be familiar with the Cell on Wheels (COW) concept that carriers have deployed to bring temporary wireless service to busy venues or disaster relief areas. Now AT&T is giving the COW acronym a new high-flying meaning: Cell on Wings.The carrier at its Shape Tech Expo at AT&T Park in San Francisco this week provided an update on its drone (unmanned aerial vehicles) efforts, including what it calls flying COWs. John Donovan, chief strategy officer and group president for AT&T Technology and Operations, wrote in a blog post that AT&T this week was starting the trial phase of its national drone program.To read this article in full or to leave a comment, please click here

Comparing Swarm, Swarmkit and Swarm Mode

One of the big features in Docker 1.12 release is Swarm mode. Docker had Swarm available for Container orchestration from 1.6 release. Docker released Swarmkit as an opensource project for orchestrating distributed systems few weeks before Docker 1.12(RC) release. I had some confusion between these three projects. In this blog, I have tried to put … Continue reading Comparing Swarm, Swarmkit and Swarm Mode

Juniper patches high-risk flaws in Junos OS

Juniper Networks has fixed several vulnerabilities in the Junos operating system used on its networking and security appliances, including a flaw that could allow hackers to gain administrative access to affected devices.The most serious vulnerability, rated 9.8 out of 10 in the Common Vulnerability Scoring System, is located in the J-Web interface, which allows administrators to monitor, configure, troubleshoot and manage routers running Junos OS. The issue is an information leak that could allow unauthenticated users to gain admin privileges to the device.To read this article in full or to leave a comment, please click here

Juniper patches high-risk flaws in Junos OS

Juniper Networks has fixed several vulnerabilities in the Junos operating system used on its networking and security appliances, including a flaw that could allow hackers to gain administrative access to affected devices.The most serious vulnerability, rated 9.8 out of 10 in the Common Vulnerability Scoring System, is located in the J-Web interface, which allows administrators to monitor, configure, troubleshoot and manage routers running Junos OS. The issue is an information leak that could allow unauthenticated users to gain admin privileges to the device.To read this article in full or to leave a comment, please click here

Juniper patches high-risk flaws in Junos OS

Juniper Networks has fixed several vulnerabilities in the Junos operating system used on its networking and security appliances, including a flaw that could allow hackers to gain administrative access to affected devices.The most serious vulnerability, rated 9.8 out of 10 in the Common Vulnerability Scoring System, is located in the J-Web interface, which allows administrators to monitor, configure, troubleshoot and manage routers running Junos OS. The issue is an information leak that could allow unauthenticated users to gain admin privileges to the device.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cybersecurity is only as strong as your weakest link—your employees

You can have the most secure system in the world, but hackers will always seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most likely to be the result of employee error or an inside job, according to the ACC Foundation: State of Cybersecurity Report.It’s good to focus on firewalls, malware defenses and data protection, but too often employees are an afterthought.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cybersecurity is only as strong as your weakest link—your employees

You can have the most secure system in the world, but hackers will always seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most likely to be the result of employee error or an inside job, according to the ACC Foundation: State of Cybersecurity Report.It’s good to focus on firewalls, malware defenses and data protection, but too often employees are an afterthought.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The rise of captive centers: Is it the death knell for outsourcing?

I’m sure it has not gone unnoticed by those who keep a close eye on the industry: Several large companies have announced they will set up or expand captive centers in countries like India to take on new work or, in some cases, existing work from their outsourcing partners. The companies are from a range of industries, including financial services, retail and oil, and gas.Captive centers have long been considered a superior choice when the nature of certain work is proprietary, too complex to hand off to a third party, or requires a higher degree of control. It often means a company is weighing value over cost efficiency for a particular project or line of work.To read this article in full or to leave a comment, please click here

GE and Microsoft team on IoT platform

GE's industrial Internet of Things platform, Predix, is going to be available on the Microsoft Azure cloud, but not immediately. It will be globally commercial available in the second quarter of 2017.GE believes that Predix needs to be a complete product, from the edge (the sensor on the shop floor) to the cloud, or Azure in this instance. The upshot: It will be easier to integrate tools such as Microsoft's Cortana, the intelligent personal assistant, with Predix.To read this article in full or to leave a comment, please click here

The threat hunter’s guide to securing the enterprise

It’s time to face facts: Attackers are stealthy enough to evade your monitoring systems. If you’re sitting back waiting for alarms to go off, there’s a good chance you’re already hosed.Despite spending more than $75 billion on security products and services, enterprises are frequently compromised, highly sensitive data is stolen, and the fallout can be devastating. Worse, enterprises don’t discover they’ve been breached for weeks to months after initial compromise, taking between 120 to 200 days on average to even detect an attack. That’s a six-month head start on reconnaissance and exploitation -- more time on your network than most of your recent hires.To read this article in full or to leave a comment, please click here

The threat hunter’s guide to securing the enterprise

It’s time to face facts: Attackers are stealthy enough to evade your monitoring systems. If you’re sitting back waiting for alarms to go off, there’s a good chance you’re already hosed.Despite spending more than $75 billion on security products and services, enterprises are frequently compromised, highly sensitive data is stolen, and the fallout can be devastating. Worse, enterprises don’t discover they’ve been breached for weeks to months after initial compromise, taking between 120 to 200 days on average to even detect an attack. That’s a six-month head start on reconnaissance and exploitation -- more time on your network than most of your recent hires.To read this article in full or to leave a comment, please click here

The threat hunter’s guide to securing the enterprise

It’s time to face facts: Attackers are stealthy enough to evade your monitoring systems. If you’re sitting back waiting for alarms to go off, there’s a good chance you’re already hosed.Despite spending more than $75 billion on security products and services, enterprises are frequently compromised, highly sensitive data is stolen, and the fallout can be devastating. Worse, enterprises don’t discover they’ve been breached for weeks to months after initial compromise, taking between 120 to 200 days on average to even detect an attack. That’s a six-month head start on reconnaissance and exploitation -- more time on your network than most of your recent hires.To read this article in full or to leave a comment, please click here

Review: Acer Chromebook 14 for Work aims at corporate IT

The Acer Chromebook 14 for Work is part of a new generation of Chromebooks. This isn't a low-end laptop aimed at budget shoppers, nor is it Google's Chromebook Pixel, which originally sold for $1,299 and was designed for people who work in the cloud and want hardware as good as anything Apple produces.To read this article in full or to leave a comment, please click here(Insider Story)

How to go on the offensive vs security foes

Focus to detectionImage by Christer van der MeerenThe industry is now moving from a focus on prevention, in which organizations try to make the perimeter impenetrable and avoid being hacked, to a focus on rapid detection, where companies can quickly identify and mitigate threats that are within the perimeter already.To read this article in full or to leave a comment, please click here

How to go on the offensive vs security foes

Focus to detectionImage by Christer van der MeerenThe industry is now moving from a focus on prevention, in which organizations try to make the perimeter impenetrable and avoid being hacked, to a focus on rapid detection, where companies can quickly identify and mitigate threats that are within the perimeter already.To read this article in full or to leave a comment, please click here