Archive

Category Archives for "Networking"

Shlomo Kramer: a security investor looking for smart entrepreneurs to disrupt markets

Shlomo Kramer Recently, endpoint-protection startup LightCyber announced a second round of funding - $20 million – including an investment from an individual investor with an impressive track record backing successful security startups: Shlomo Kramer.Kramer, who is Israeli, has a long-term relationship with the company’s CEO Gonen Fink, who worked with him for years at Check Point Software where Kramer was one of the founders.To read this article in full or to leave a comment, please click here

Shlomo Kramer: a security investor looking for smart entrepreneurs to disrupt markets

Shlomo Kramer Recently, endpoint-protection startup LightCyber announced a second round of funding - $20 million – including an investment from an individual investor with an impressive track record backing successful security startups: Shlomo Kramer.Kramer, who is Israeli, has a long-term relationship with the company’s CEO Gonen Fink, who worked with him for years at Check Point Software where Kramer was one of the founders.To read this article in full or to leave a comment, please click here

Cisco flexes its security muscle at Cisco Live

This week in Las Vegas, Cisco is hosting 28,000 of its best customers at Cisco Live, it’s annual, global user event. It’s hot in Vegas in July, which is fitting, as Cisco’s security business has been red hot of late. This is in stark contrast to the company’s position in security just a few years ago when many Cisco watchers questioned if it was serious about security. Over the years, Cisco has mastered the art of using market transitions to capture share, and it appears it is well on its way to doing so in the security market. The market transition that’s changing security is digital transformation. Earlier this year, I wrote a post highlighting the new rules of security in the digital era.To read this article in full or to leave a comment, please click here

Microsoft fixes critical vulnerabilities in IE, Edge, Office, and Windows print services

Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.The patches, released Tuesday, are arranged in 11 security bulletins, 10 of which are for Microsoft products. The remaining patch covers Adobe Flash Player, which is bundled with Internet Explorer in Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012 R2 and Windows 10.Six security bulletins, including the Flash Player one, are rated critical and primarily cover remote code execution vulnerabilities that could lead to a complete system compromise.To read this article in full or to leave a comment, please click here

Microsoft fixes critical vulnerabilities in IE, Edge, Office, and Windows print services

Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.The patches, released Tuesday, are arranged in 11 security bulletins, 10 of which are for Microsoft products. The remaining patch covers Adobe Flash Player, which is bundled with Internet Explorer in Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012 R2 and Windows 10.Six security bulletins, including the Flash Player one, are rated critical and primarily cover remote code execution vulnerabilities that could lead to a complete system compromise.To read this article in full or to leave a comment, please click here

Bay Dynamics lands another $23 million to speed expansion

Security-analytics firm Bay Dynamics has pulled down $23 million more in venture funding to help the company speed up its international expansion and execution of its action plan to reach customers and differentiate itself from competitors.The Series B financing is led by Carrick Capital Partners and includes Series A investor Comcast Ventures.The company claims hundreds of customers including some of the Fortune 50.Bay Dynamics’ Risk Fabric ranks the riskiest users, devices, applications and other network entities, according to a report by Gartner on User and Entity Behavior Analytics, the category in which it places Bay Dynamics. The platform can discover insider threats as well as data theft, and can analyze likely attack surfaces in customer networks, Gartner says.To read this article in full or to leave a comment, please click here

Bay Dynamics lands another $23 million to speed expansion

Security-analytics firm Bay Dynamics has pulled down $23 million more in venture funding to help the company speed up its international expansion and execution of its action plan to reach customers and differentiate itself from competitors.The Series B financing is led by Carrick Capital Partners and includes Series A investor Comcast Ventures.The company claims hundreds of customers including some of the Fortune 50.Bay Dynamics’ Risk Fabric ranks the riskiest users, devices, applications and other network entities, according to a report by Gartner on User and Entity Behavior Analytics, the category in which it places Bay Dynamics. The platform can discover insider threats as well as data theft, and can analyze likely attack surfaces in customer networks, Gartner says.To read this article in full or to leave a comment, please click here

Who’s got the best cloud latency?

For some applications, the public cloud is only as good as the slowest connection to it. Latency of cloud providers – the amount of time it takes for a cloud-based service to respond to a user’s request – is one of many critical factors that customers consider when choosing a cloud provider and monitoring their workloads. So which cloud provider has the best latency? +MORE AT NETWORK WORLD: Who’s right behind Amazon in IaaS cloud revenue? Not Microsoft | 4 Tips for buying cloud management software +To read this article in full or to leave a comment, please click here

Core Network Architecture in 3G Mobile Networks

Core Network Architecture in 3G Mobile Networks – Most of the Mobile Broadband Networks worldwide are currently delivering Data Services based on 3G & 4G Technologies. Although 4G/LTE is widely deployed globally but still there are countries and operators running 2G/3G with relatively convenient Data rates to the market demands. In this article, I am […]

The post Core Network Architecture in 3G Mobile Networks appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Review: Promisec goes the extra step to secure PCs

In the past year we've seen an influx of endpoint detection and response (EDR) tools that promise to bring order, through greater visibility, to the wild west of endpoints within a large organization. The scenario is all too common: IT security usually doesn't know all of the hardware and software assets that need to be protected, yet has to protect them. Even as we struggle to put security controls in place for prevention, we know that many of these endpoints are already compromised by active threats that need to be detected, assessed, quarantined, and remediated.EDR tools are built for detection and response (hence the category name), and most leave it at that. Promisec adds sophisticated remediation to Promisec Endpoint Manager (PEM), which is precisely why I was interested in getting a close look at the product. Like other EDR products, PEM can scan endpoints on a schedule to detect anomalies or abnormalities and verify that security controls -- such as required applications, patches, settings, and so on -- are in place. Unlike other products in the category, PEM can also launch scripts on the endpoints to take corrective action.To read this article in full or to leave a Continue reading

Review: Promisec goes the extra step to secure PCs

In the past year we've seen an influx of endpoint detection and response (EDR) tools that promise to bring order, through greater visibility, to the wild west of endpoints within a large organization. The scenario is all too common: IT security usually doesn't know all of the hardware and software assets that need to be protected, yet has to protect them. Even as we struggle to put security controls in place for prevention, we know that many of these endpoints are already compromised by active threats that need to be detected, assessed, quarantined, and remediated.To read this article in full or to leave a comment, please click here(Insider Story)

OK, Google: 160 valuable voice commands for Android

Android has actually had a robust voice command system in place for ages -- and the number of things it can do for you is expanding all the time.In fact, Google may be preparing to unveil a newly rebranded and even more conversational version of its virtual assistant later this year, but you don't have to wait to start making the most of your mobile device's listening smarts.MORE ON NETWORK WORLD: How to use public Wi-Fi hotspots safely Below, we've listed 160 commands that are fully functional and ready to be used right now. We've put words and phrases that are examples in [brackets]; additional explanations are in (parentheses). And when you see a command with two words separated by a slash (e.g., "Enable/disable battery saver mode"), you know to say just one or the other of the words, right? Thought so.To read this article in full or to leave a comment, please click here

Feds to hire 3,500 cybersecurity pros by year’s end

Last October, the U.S. government began hiring 6,500 new cybersecurity IT professionals. It has hired 3,000 so far, and plans to hire another 3,500 by January 2017, the White House said Tuesday.The government is now trying to improve its recruiting and retention of cybersecurity professionals. This includes finding ways to improve government pay, which can be well below the private sector.ALSO ON NETWORK WORLD: 8 ways to jumpstart your career This strategy was detailed Tuesday in a White House memo. In it, officials called for expanded job recruiting campaigns "in order to raise awareness of employment opportunities and compete for top cybersecurity talent," Shaun Donovan, the director of the White House Office of Management and Budget, Beth Cobert, the acting director of the Office of Personnel Management and federal CIO Tony Scott wrote in the memo.To read this article in full or to leave a comment, please click here

Feds to hire 3,500 cybersecurity pros by year’s end

Last October, the U.S. government began hiring 6,500 new cybersecurity IT professionals. It has hired 3,000 so far, and plans to hire another 3,500 by January 2017, the White House said Tuesday.The government is now trying to improve its recruiting and retention of cybersecurity professionals. This includes finding ways to improve government pay, which can be well below the private sector.ALSO ON NETWORK WORLD: 8 ways to jumpstart your career This strategy was detailed Tuesday in a White House memo. In it, officials called for expanded job recruiting campaigns "in order to raise awareness of employment opportunities and compete for top cybersecurity talent," Shaun Donovan, the director of the White House Office of Management and Budget, Beth Cobert, the acting director of the Office of Personnel Management and federal CIO Tony Scott wrote in the memo.To read this article in full or to leave a comment, please click here

IT service desk suites: The features users love and hate

IT service management (ITSM) tools typically focus on serving the needs of internal customers and solving their IT problems. Enterprise IT managers say the most important criteria to consider when choosing an ITSM vendor include customizable workflow automation, a system for creating trouble tickets and escalation mechanisms.To read this article in full or to leave a comment, please click here(Insider Story)

Fake Olympic tickets and Zika news apps scam users

These days not a headline goes by without some cybercriminal jumping all over it. Now, with the Olympics coming up and travelers wary of the Zika virus, scammers are creating fake websites and apps to steal money or to infect users with malware."There are actually sites that say they sell tickets, but never actually give you tickets," said James Pledger, research director at RiskIQ.Sometimes, it's easy to spot the fakes.INSIDER: Traditional anti-virus is dead: Long live the new and improved AV "One of the most common things is very poor English," he said. "Or they'll only accept payment in online currencies or wire transfers. Other indicators are that there are a lot of complaints, or they've been up for a very short time frame."To read this article in full or to leave a comment, please click here

Fake Olympic tickets and Zika news apps scam users

These days not a headline goes by without some cybercriminal jumping all over it. Now, with the Olympics coming up and travelers wary of the Zika virus, scammers are creating fake websites and apps to steal money or to infect users with malware."There are actually sites that say they sell tickets, but never actually give you tickets," said James Pledger, research director at RiskIQ.Sometimes, it's easy to spot the fakes.INSIDER: Traditional anti-virus is dead: Long live the new and improved AV "One of the most common things is very poor English," he said. "Or they'll only accept payment in online currencies or wire transfers. Other indicators are that there are a lot of complaints, or they've been up for a very short time frame."To read this article in full or to leave a comment, please click here

Taking a closer look at bots from Apple, Facebook and Google

"Bots" have been around for decades. Recently, however, it's become the norm for large technology companies to build, support and develop bots for a wide variety of uses. Because bots can be so many different things, it's often difficult to parse the bona fides from the wannabes — or even determine what bots do.What exactly are bots?  "A bot is an autonomous machine interface that's built to serve a purpose that traditionally was served by a human," says Michael Facemire, a principal analyst with Forrester Research.Bots can stimulate human conversation, but their greatest strength lies in the capability to simplify business processes that don't require human intervention, according to Adam Fingerman, chief experience officer at Arctouch, a mobile app design and development company. "From a utility point of view, bots will have an even bigger impact on how we work than how we live," he says.  To read this article in full or to leave a comment, please click here